Best Ai Music Generator

v1.0.0

Tired of searching royalty-free libraries only to find the same overused tracks? The best-ai-music-generator skill on ClawHub lets you describe the music you...

0· 42·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, required env var (NEMO_TOKEN), API domain, endpoints (session creation, SSE, upload, credits, export) and config path (~/.config/nemovideo/) are all consistent with a remote music-generation service.
Instruction Scope
Instructions stay within the music-generation domain but include writing/reading ~/.config/nemovideo/client_id (create UUID if missing) and constructing a workspace claim URL containing a token. These are reasonable for session management but can expose tokens if the generated URL is shared.
Install Mechanism
No install spec or code files — instruction-only skill that relies on network calls. Lowest-risk install surface; nothing is downloaded or written beyond the config path the skill itself documents.
Credentials
Only a single credential (NEMO_TOKEN) is required and is appropriate for the declared API interactions. The skill also recommends creating/storing a local client_id under ~/.config/nemovideo/, which aligns with its anonymous-token flow.
Persistence & Privilege
Skill is not always-enabled and does not request system-wide or other-skill configuration changes. It may create a small per-user config file (client_id) in ~/.config/nemovideo/, which is proportional for session management.
Assessment
This skill appears coherent for an AI music service, but review these before installing: (1) NEMO_TOKEN is the only required secret—treat it like a password and avoid giving long-lived or broad-scope tokens unless you trust the provider. (2) The skill will read/write ~/.config/nemovideo/client_id and may generate a workspace URL that includes a token; do not share that URL publicly because it could leak access. (3) If you don't want to supply a personal token, the skill supports generating an anonymous starter token (temporarily valid). (4) Because it's instruction-only and performs network requests, monitor outgoing connections if you need stricter privacy controls. If any of the above behaviors are unacceptable, do not install or provide credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk979hpyt4ct9b51f41s2spfk9d83yj1z

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🎵 Clawdis
EnvNEMO_TOKEN
Primary envNEMO_TOKEN

Comments