Occupational Therapist Video
v1.0.0Create concise patient and referral videos highlighting occupational therapy approaches, outcomes, and functional daily life goals for diverse OT practices.
⭐ 0· 32·0 current·0 all-time
bypeandrover adam@peand-rover
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md instructions: the skill asks for practice details and produces 60–90s scripts and B‑roll ideas. It does not request unrelated credentials, binaries, or system access.
Instruction Scope
Instructions are narrowly focused on asking practice-specific questions and generating scripts/B‑roll. However, the guidance encourages use of "genuine child progress" footage — this raises privacy and consent considerations (e.g., HIPAA, parental consent) that the skill does not address. No instructions ask the agent to read files, env vars, or external endpoints.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk or fetched at install time.
Credentials
No environment variables, credentials, or config paths requested. The skill does not ask for unrelated secrets or system access.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent privileges or modification of other skills or system settings.
Assessment
This skill appears coherent for generating OT video scripts, but before installing or using it consider: (1) do not provide or upload any protected health information (PHI) or unconsented patient footage — obtain written parental/patient consent for identifiable minors/adults; (2) prefer anonymized or staged footage if possible; (3) review and edit generated scripts for clinical accuracy and appropriate therapeutic claims; (4) ensure you have rights for any music or stock footage recommended; (5) if you operate in a regulated jurisdiction (e.g., US HIPAA), confirm use of this skill and any downstream services complies with applicable privacy and data-protection rules.Like a lobster shell, security has layers — review code before you run it.
latestvk9728yj8eryjmepwc824k9zscd8400rj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
