Contract Signing Workflow Assistant
v1.0.0Design a practical contract-signing workflow with Nota Sign. Use this skill when the user needs steps for approvals, signer roles, signing order, recipient v...
⭐ 0· 35·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description ask for contract-signing workflows and the SKILL.md contains only workflow design steps, templates, checklists, and role definitions — all consistent with the stated purpose.
Instruction Scope
Runtime instructions are limited to asking the assistant to identify parties, roles, signing order, verification needs, templates, and recordkeeping; there are no directives to read local files, access environment variables, call external endpoints, or transmit data.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or downloaded during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no requests for secrets or unrelated service tokens.
Persistence & Privilege
always is false and the skill does not request persistent presence or elevated privileges. Autonomous model invocation is allowed by default but this skill's instructions do not leverage it to access extra system resources.
Assessment
This is an instruction-only helper for designing contract-signing workflows and appears coherent and low-risk: it does not install software or ask for credentials. Before installing or using it, remember: (1) it is not legal advice — have a lawyer review contracts; (2) do not paste sensitive credentials or full confidential documents into the chat; (3) the skill's source is listed as "unknown" in the metadata — if provenance matters for your organization, verify the publisher or prefer a skill from a known vendor; (4) because the platform allows autonomous invocation by default, review what prompts you allow the agent to run automatically, but in this case there are no broad permissions requested.Like a lobster shell, security has layers — review code before you run it.
latestvk978drzkth4384vbnw9ynzwsd1844m6c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📄 Clawdis
