Kpop Idol Generator
v1.0.0Generate k-pop idol style portraits and kpop photocard aesthetic images — perfect for kpop fan edits, korean beauty looks, idol photoshoot vibes, korean fash...
⭐ 0· 57·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the implementation: the JS program sends prompts to an image-generation API and returns an image URL. There are no unrelated environment variables, system binaries, or permissions requested.
Instruction Scope
SKILL.md and README instruct the user to run node kpopidolgenerator.js with a --token and prompt; the runtime behavior matches that (submits prompt and optional ref to a remote API and prints an image URL). Note: SKILL.md points users to neta.art/open but the code calls https://api.talesofai.com — these are claimed to be the same service in README, but you should verify the domain/token pairing before sending tokens or sensitive prompts.
Install Mechanism
No install script or external downloads. The skill is instruction + a small JS file with a tiny package.json; nothing is written to disk beyond the skill file and no archives are fetched at install time.
Credentials
The skill does not declare environment variables; it expects a Neta API token passed via --token (proportional to its purpose). Be aware that the token and your prompt (and any reference UUID) are transmitted to the external API (api.talesofai.com).
Persistence & Privilege
The skill is not always-enabled and does not request persistent or elevated platform privileges. It does not modify other skills or system-wide settings.
Assessment
This skill appears to do what it claims: it sends your text prompt (and optional reference UUID) and the provided token to an external image-generation API and prints back a URL. Before using it: (1) Verify you trust the service domain (README and code reference api.talesofai.com vs neta.art/open) and that the token you provide is for that service. (2) Don’t pass sensitive secrets or personally identifying prompts you wouldn’t want sent to a third party. (3) Be aware of legal/ethical issues around photorealistic images and likenesses. The code is short and readable with no obfuscation; no unrelated credentials or system access are requested.Like a lobster shell, security has layers — review code before you run it.
latestvk976c20j6wznwpfw3b39w5pc2d84n7n4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
