Public Status Page

v1.0.0

Designs tailored public status pages for e-commerce, including incident templates, subscriber notifications, and uptime reporting based on your business cont...

0· 53·0 current·0 all-time
bynexscope-ai@nexscope
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill is a design/consulting assistant for status pages and incident communications; it does not request unrelated credentials, binaries, or system access. The declared capabilities (cross-platform guidance, templates, reporting frameworks) are consistent with an instruction-only, consultative skill.
Instruction Scope
SKILL.md contains only prompts, inputs expected from the user, example usage, and a one-line install command for documentation. It does not instruct the agent to read files, access environment variables, call external endpoints, or exfiltrate data beyond what a user explicitly supplies in their prompt.
Install Mechanism
No install spec or code files are present; the skill is instruction-only. The single 'clawhub install public-status-page' line appears as user-facing docs rather than an automated install; there is no archive download or package install to evaluate.
Credentials
The skill declares no required environment variables, credentials, or config paths. That matches its stated role (design advice). Users should still avoid pasting sensitive credentials or PII into prompts when requesting recommendations.
Persistence & Privilege
always is false and there is no indication the skill modifies agent/system settings. disable-model-invocation is false (normal default) which allows autonomous invocation — acceptable here for a consultative skill but note that autonomous invocation is the platform default.
Assessment
This skill is instruction-only and coherent with its stated purpose—no credentials or installs are required. Before using it, avoid pasting sensitive credentials, customer lists, or PII into prompts; instead provide non-sensitive descriptions or anonymized examples. Validate any recommended templates or automation against your platform/provider policies and test changes in a staging environment before applying to production. Also note the package listing has no homepage or external provenance; if provenance or ongoing support matters to you, consider contacting the listed author (Nexscope AI) or preferring a skill with a known homepage.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ak01ns5tcftfkathbszdrp583sk0n

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments