Architecture Firm Video — Capability Showcase and Client Acquisition Videos for Architecture Firm Firms

v1.0.0

Create concise videos showcasing architecture firms' expertise, case studies, and team capabilities to attract and inform potential clients.

0· 40·0 current·0 all-time
bypeandrover adam@peand-rover
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description claim a video-assistant for architecture firms; the skill requests no binaries, credentials, or installs — appropriate for a purely instructional assistant that produces copy, shot lists, or video outlines.
Instruction Scope
SKILL.md contains only a concise role description and tags. It does not instruct the agent to read files, access environment variables, call external endpoints, or exfiltrate data.
Install Mechanism
No install spec or code files are present. Being instruction-only means nothing will be written to disk or fetched during installation.
Credentials
The skill declares no required environment variables, credentials, or config paths — proportional to its stated purpose as a guidance-only assistant.
Persistence & Privilege
always is false and there are no indications the skill requests elevated persistence or modifies other skills or system-wide settings. Autonomous invocation remains possible by default (platform behavior) but is not escalated by this skill.
Assessment
This skill is instruction-only and appears safe to add: it won't install software or request credentials. Before using, remember that any firm- or client-specific details you paste into the agent could be included in generated material — avoid sharing sensitive client data unless you trust the environment. Also note the skill does not integrate with video hosting or editing services; if you want automated uploads or rendering you will need to provide appropriate, separate connectors/credentials, and review those for proportionality.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cv38e0m3rk1ah9ad84xx8cn83yd7f

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments