Gym Video
v1.0.0Create tailored 60-90 second gym videos showcasing facilities, staff, classes, and member experiences to boost membership engagement and retention.
⭐ 0· 31·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions all describe producing 60–90s gym marketing/tour videos. The data the skill asks to gather (gym type, equipment, schedule, staff, community, peak hours) is appropriate and necessary for that purpose.
Instruction Scope
SKILL.md only instructs the agent to ask the user for required context and to generate a script and shot suggestions. It does not instruct reading system files, environment variables, or external credentials, nor does it direct data to unexpected external endpoints.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes disk writes and external code execution risk.
Credentials
The skill declares no required environment variables, credentials, or config paths and its needs are limited to user-supplied gym details; nothing disproportionate is requested.
Persistence & Privilege
always is false and default autonomous invocation is allowed (platform default). The skill does not request persistent system presence or modify other skills.
Assessment
This skill appears coherent and low-risk because it only generates scripts from user-provided gym details. Before using it: (1) avoid supplying sensitive personal data or private member details; (2) obtain written consent/releases from members and staff before filming or publishing; (3) do not ask the agent to upload raw video or personal data to unknown external endpoints; (4) confirm compliance with local privacy laws (GDPR, minors, health-related info) and keep any membership or payment data out of prompts. Because the skill can be invoked autonomously by default, consider restricting autonomous use if you are concerned about accidental sharing of business-sensitive details.Like a lobster shell, security has layers — review code before you run it.
latestvk977msz4c0ktaery4s0471n6en8423a2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
