Sleep Specialist Video
v1.0.0Create concise 60-90 second videos to educate and enroll patients on sleep disorders, study processes, treatments, and adherence strategies.
⭐ 0· 33·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the instructions: the skill asks for clinician-provided context (specialization, study types, treatments, adherence process) and produces 60–90s scripts. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md only instructs the agent to ask the user what type of video and to gather relevant clinical context, then generate a brief script. It does not instruct reading system files, environment variables, or contacting external endpoints, nor does it request patient data or other unrelated information.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be written to disk or downloaded as part of installation.
Credentials
The skill requires no environment variables, credentials, or config paths. The information it asks for is appropriate for generating educational videos and appears to be provided interactively by the clinician.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or system-wide configuration changes. Autonomous model invocation is allowed (platform default) but not combined with any other elevated privileges here.
Assessment
This skill is instruction-only and looks coherent for producing clinician-reviewed video scripts. Before using it in practice: (1) do not paste or request protected health information (PHI) into prompts—keep examples de-identified; (2) have a qualified clinician review final scripts for medical accuracy and compliance (HIPAA, local regulations, and institutional policies); (3) verify any patient examples or images used in produced videos have proper consent; and (4) if you enable autonomous invocation for convenience, monitor initial outputs to ensure no unintended requests for sensitive data.Like a lobster shell, security has layers — review code before you run it.
latestvk974ce6mvfyxxpzf44vcvn8dch843dbp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
