Stem Camp Video
v1.0.0Create 60-90 second videos showcasing STEM camp projects, curriculum, and instructor credentials to engage parents and boost enrollment.
⭐ 0· 35·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md instructions: ask the camp director for details, generate a short script and scene descriptions, and suggest b-roll. No unrelated permissions, binaries, or services are requested.
Instruction Scope
SKILL.md contains only high-level authoring instructions (questions to ask, script structure, visual guidance). It does not instruct the agent to read files, access environment variables, modify system state, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files — lowest-risk, instruction-only skill. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. The described functionality (script and b-roll suggestions) does not require additional secrets or system access.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges. Autonomous invocation is allowed by default but is not combined with other concerning permissions.
Assessment
This skill appears low-risk and does what it says: produce short videos scripts and b-roll ideas for STEM camps. Before installing, consider the following: (1) privacy — do not provide or ask the skill to include personally identifiable information or identifiable images of minors without parental consent; redact names or faces as needed; (2) hosting/source — the skill has no homepage and an unknown source owner, so if you plan to rely on it long-term, consider asking the publisher for a privacy statement or provenance; (3) external data — although the skill doesn't declare network calls, be cautious about pasting sensitive information into any tool (student records, health info, exact addresses); and (4) testing — run it with placeholder/non-sensitive examples first to confirm outputs meet your legal and branding requirements. Overall, the skill is coherent and proportionate to its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk97ey0y614yv2neb5fjje06d5s840ybq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
