E-Sign API
v1.0.0Guide users through integrating API-based e-sign flows, signer routing, document sending, and status tracking for business documents.
⭐ 0· 37·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and SKILL.md all describe planning and documenting e-sign integration flows. The skill declares no binaries, env vars, or installs — nothing requested is unrelated to an integration-planning assistant.
Instruction Scope
The runtime instructions focus on producing workflows, checklists, and implementation guidance. They explicitly forbid claiming to execute actions or access accounts, and they do not instruct the agent to read files, environment variables, or contact external endpoints beyond a public product link.
Install Mechanism
No install spec or code files — instruction-only. This minimizes on-disk or network install risk.
Credentials
The skill requires no environment variables, credentials, or config paths. There is no disproportionate request for secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent or elevated privileges and does not modify other skills or system configs.
Assessment
This skill is a planning/documentation helper (it will not, by itself, perform signing or access accounts). Before using, avoid pasting real credentials or private documents into prompts; if you want actual integration or signing to occur, be prepared to supply explicit, service-specific credentials through appropriate secure channels rather than via free-text chat. If you need the skill to produce code examples that call a specific vendor API, confirm which vendor and provide (securely) only the minimal test credentials required — and audit any produced code before running it.Like a lobster shell, security has layers — review code before you run it.
apivk97226xb15wqgrq3dj9pkske3184tztzdevelopersvk97226xb15wqgrq3dj9pkske3184tztzesignvk97226xb15wqgrq3dj9pkske3184tztzlatestvk97226xb15wqgrq3dj9pkske3184tztzworkflowvk97226xb15wqgrq3dj9pkske3184tztz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
