Patch Maker Video — Product Showcase and Custom Order Videos for Embroidered Patch Makers and Custom Badge Makers
v1.0.0Creates video showcases and process clips highlighting craftsmanship, design accuracy, and order details for custom embroidered and woven patch makers.
⭐ 0· 37·0 current·0 all-time
bypeandrover adam@peand-rover
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match: a video assistant for patch makers. The skill declares no binaries, no env vars, and no installs — which is proportionate for a content-generation/assistant role.
Instruction Scope
SKILL.md is high-level role/prompt text and does not instruct the agent to read system files, access environment variables, or post to external endpoints. It is vague about operational details (how to obtain artwork, where to upload finished videos, or how to handle customer PII/consent), so runtime behavior will depend on the agent's implementation and user inputs.
Install Mechanism
No install spec and no code files — lowest-risk form (instruction-only). Nothing will be written to disk or downloaded by default.
Credentials
No required environment variables, credentials, or config paths are declared. There is no disproportionate request for secrets or unrelated credentials.
Persistence & Privilege
always is false and there are no indications the skill requests permanent presence or modifies other skills or system-wide settings. Note the platform default allows autonomous invocation, but that is standard and not by itself a red flag here.
Assessment
This skill appears internally consistent and low-risk because it is instruction-only and requests no credentials or installs. Before using: avoid sending any sensitive customer data or unconsented artwork to the agent; if the skill asks to upload videos to social platforms or request API keys later, treat that as a new risk and verify the target service and permissions; watch for any prompts that ask for tokens, passwords, or broad file-system access and do not provide them. If you need stricter control, disable autonomous invocation or inspect any future concrete runtime instructions (e.g., commands to post files or call external APIs) before providing credentials or files.Like a lobster shell, security has layers — review code before you run it.
latestvk97febrygv5sg02q46tm39kpqn83ztvd
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
