I2I

v1.0.0

Placeholder skill for image-to-image workflows on skills.video. Use when the user is asking about i2i generation and the concrete API contract has not been i...

0· 78·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md: it's explicitly a placeholder for i2i on skills.video and does not claim functionality it doesn't provide.
Instruction Scope
Instructions are conservative (tell the user it's a placeholder, check for provider-specific OpenAPI/docs, avoid inventing fields). They are intentionally incomplete — this is appropriate, but the guidance to 'check whether an openapi.json or docs page exists' implies network or docs access which is expected but should be understood by the user.
Install Mechanism
No install spec and no code files; nothing is written to disk or fetched at install time.
Credentials
No environment variables, primary credential, or config paths are requested — proportional to its placeholder nature.
Persistence & Privilege
Default invocation and persistence flags (not always:true, model invocation permitted) are normal and there is no evidence the skill tries to modify other skills or system settings.
Assessment
This skill is a safe, non-functional placeholder: it won't install code or ask for secrets, but it also won't perform i2i generation until a concrete API contract (OpenAPI or provider docs) is added. If you install it, expect the agent to inform users that the skill is incomplete and to ask for the exact model/endpoint when needed. Be aware the agent may attempt to look up provider OpenAPI/docs (network access) to continue—do not provide credentials or private endpoints to this placeholder. For production i2i workflows, prefer a fully implemented skill that documents endpoints, payloads, and error handling; monitor this skill for future updates before relying on it.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dc00h7qhxx6mestgjqszqkn83h4m0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments