Policy Writer
v1.0.0Create professional internal policies for any business function with clear rules, procedures, compliance references, and tailored formality for company size.
⭐ 2· 748·4 current·4 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and README/ SKILL.md describe generating internal policies; all required resources (none) match that purpose. There are no unexpected environment variables, binaries, or config paths declared.
Instruction Scope
Runtime instructions are a simple prompt/template for producing policy documents and do not instruct the agent to read files, access unrelated system state, or exfiltrate data. Note: the SKILL.md/README include marketing links to third-party 'context packs' and tools; those are external resources but the skill does not automatically send data to them.
Install Mechanism
No install spec and no code files — instruction-only — so nothing is written to disk or fetched during install.
Credentials
The skill declares no environment variables, no credentials, and no config paths. That is proportionate to an instruction-only policy/template generator.
Persistence & Privilege
Defaults (not always-included, agent-invocable, model-invocation allowed) are used. There is no request for permanent presence or modifications to other skills or system-wide settings.
Assessment
This skill is instruction-only and appears coherent for generating policy documents. Before installing: (1) avoid pasting sensitive secrets or personal data into prompts used with the skill; (2) if you need legally binding or industry-certified policies, have outputs reviewed by legal/compliance experts — the skill produces useful drafts but is not a substitute for counsel; (3) the README links to paid third-party 'context packs' — verify those external sites before purchasing; (4) since the skill can be invoked by an agent, ensure you control what data your agent sends into prompts (don’t include credentials or confidential material when requesting policy text).Like a lobster shell, security has layers — review code before you run it.
businessvk97c63snk8e3yyp11veg2sjgb9812z6vcompliancevk97c63snk8e3yyp11veg2sjgb9812z6vgdprvk97c63snk8e3yyp11veg2sjgb9812z6vhrvk97c63snk8e3yyp11veg2sjgb9812z6vlatestvk97c63snk8e3yyp11veg2sjgb9812z6vpolicyvk97c63snk8e3yyp11veg2sjgb9812z6vsoc2vk97c63snk8e3yyp11veg2sjgb9812z6v
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
