Ecommerce Store Video

v1.0.0

Create 45-90 second product demo and brand story videos for online stores that showcase product use, scale, texture, and build brand trust.

0· 71·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (produce 45–90s ecommerce product and brand videos) match the SKILL.md steps (ask video type, gather product/brand details, generate script and B-roll suggestions). Nothing requested is out of scope for creating video scripts.
Instruction Scope
SKILL.md instructs the agent only to ask the user for product category, target customer, differentiators, brand story, price point, objections, and to generate scripts/B-roll. It does not instruct reading system files, environment variables, or contacting external endpoints.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is written to disk and there is no third-party install risk.
Credentials
The skill declares no required environment variables, credentials, or config paths; the requested inputs are user-provided product/brand details appropriate to the purpose.
Persistence & Privilege
always is false and the skill does not request persistent presence or elevated privileges. It is user-invocable and can be called autonomously per platform defaults, which is appropriate for this type of skill.
Assessment
This skill appears safe and coherent: it only generates scripts and shot suggestions and asks the user for product/brand information. Before using, consider: (1) do not paste sensitive secrets or private credentials into the prompts; (2) when gathering customer testimonials or images, ensure you have consent and rights to use them in videos; (3) if a future version adds downloads, binaries, or external webhooks, re-evaluate before installing. If you need the agent to access media files, prefer uploading them explicitly rather than sharing system paths or credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ecb490fa0b6t4pp00fsw1x9842qdc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments