Hemp CBD Video — Product Education and Brand Building Videos for Hemp and CBD Companies
v1.0.0Creates educational videos for hemp and CBD brands to explain products, dosing, lab testing, extraction methods, and farm-to-bottle stories to build trust.
⭐ 0· 34·0 current·0 all-time
bypeandrover adam@peand-rover
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description describe a video/marketing assistant for hemp/CBD brands; there are no unexpected credential, binary, or platform requirements that conflict with that purpose.
Instruction Scope
SKILL.md contains product-focused copy and tags but no runtime steps that read local files, access unrelated environment variables, or exfiltrate data — the instructions stay within the stated marketing/education scope.
Install Mechanism
No install spec and no code files are present, so the skill does not write or execute code on the host; this is lowest-risk from an install perspective.
Credentials
The skill declares no environment variables, credentials, or config paths — there is no disproportionate credential or environment access requested.
Persistence & Privilege
always is false and the skill does not request persistent or cross-skill configuration; autonomous invocation is allowed (platform default) but combined with other factors this does not increase risk here.
Assessment
This skill appears internally consistent and low-risk because it is instruction-only and requests no credentials. Before installing, confirm the publisher/owner identity if you require provenance, and be aware of regulatory and compliance issues around CBD advertising (claims about health effects, dosing, or medical benefits may be restricted by law). If you plan to have the agent handle real customer data, verify the skill’s behavior after installation (ensure it does not begin transmitting customer information) and audit any future updates for added install scripts, network calls, or credential requests.Like a lobster shell, security has layers — review code before you run it.
latestvk977evyaxwsxe924ejts8dw47583yea7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
