Palliative Care Video — Patient Education and Practice Awareness Videos for Palliative Care Programs and Comfort-Focused Medicine

v1.0.0

Provides educational videos to clarify palliative care’s role in symptom management, quality of life, and goals-of-care alongside curative treatment.

0· 40·0 current·0 all-time
bypeandrover adam@peand-rover
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description promise educational palliative-care videos and the SKILL.md is a descriptive/template document about that goal. It does not request unrelated binaries, credentials, or config paths.
Instruction Scope
SKILL.md contains descriptive guidance and tags but no runtime commands, file reads, network endpoints, or requests for extra context. There is no scope creep in the instructions themselves.
Install Mechanism
No install spec and no code files are present, so nothing will be written to disk or automatically installed during agent use.
Credentials
The skill declares no required environment variables, credentials, or config paths; requested privileges are proportional to a purely informational/templating skill.
Persistence & Privilege
The skill does not request always-on presence and contains no instructions to modify agent/system configuration or other skills.
Assessment
This skill appears to be a benign descriptive/template resource, but consider these practical checks before use: verify the author/source (source is unknown), have clinical staff review content for medical accuracy and local practice alignment, avoid including any patient-identifiable information or recordings without explicit consent (HIPAA/privacy risk), add citations or references for clinical claims, and ensure any videos produced meet institutional legal/review processes and accessibility requirements (captions, language). If you plan to connect this skill to external video-generation or hosting services later, re-evaluate required credentials and network endpoints at that time.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dd3nqf1khbb2pg4zz8ydc9183zac4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments