Intake
v1.0.0Design intake forms, discovery interviews, onboarding workflows, and intake summaries for service relationships. Use when someone needs to collect the right...
⭐ 0· 209·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (designing intake forms, interviews, workflows) align with the SKILL.md content. The skill asks for no binaries, credentials, or config paths that would be unrelated to its stated purpose.
Instruction Scope
The runtime instructions are prose and templates for creating forms, interview guides, workflows, and audits. They do not instruct the agent to read system files, environment variables, or send data to external endpoints. The guidance explicitly cautions about privacy and avoiding unnecessary data collection.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is written to disk or fetched at install time.
Credentials
The skill requests no environment variables, credentials, or config paths. It does include templates and example questions that may ask for sensitive information when used — which is appropriate for intake design but is a user-facing risk (see guidance).
Persistence & Privilege
always is false and the skill is user-invocable. Autonomous invocation is allowed by platform default but this skill does not request elevated persistence or access to other skills/configs.
Assessment
This skill is instruction-only and coherent for its purpose, but remember: the outputs may include suggested questions that request sensitive personal, medical, or financial details. Before using templates with real people, (1) review and edit to collect only what you truly need, (2) avoid pasting real PII into prompts when testing, (3) ensure your intake process meets applicable privacy/regulatory requirements, and (4) don't treat the skill as legal/medical/financial advice—have a qualified professional review sensitive cases. Because the skill can be invoked by the agent, check how your agent uses it (trigger conditions) so it doesn't ask for private data unexpectedly.Like a lobster shell, security has layers — review code before you run it.
clientsvk97fj3zk9sxwhz0z3byzdenjrs82mj03discoveryvk97fj3zk9sxwhz0z3byzdenjrs82mj03formsvk97fj3zk9sxwhz0z3byzdenjrs82mj03intakevk97fj3zk9sxwhz0z3byzdenjrs82mj03latestvk97fj3zk9sxwhz0z3byzdenjrs82mj03onboardingvk97fj3zk9sxwhz0z3byzdenjrs82mj03
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
