Ai Consultant Video

v1.0.0

Generate concise AI consulting videos explaining your tailored implementation methods, industry focus, automation benefits, and measurable ROI within 90 seco...

0· 25·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the runtime instructions: the SKILL.md directs the agent to ask for consulting-specific inputs and generate short implementation/ROI video scripts, which is exactly what the skill claims to do.
Instruction Scope
Instructions are narrowly scoped to asking the user for video type and consulting details and producing a 60–90 second script with suggested content. They do not reference reading files, accessing environment variables, or sending data to external endpoints.
Install Mechanism
There is no install spec and no code files; this is instruction-only so nothing is written to disk or downloaded during install.
Credentials
The skill requires no environment variables, no credentials, and no config paths — the requested inputs are user-provided consulting context, which is proportional to the stated purpose.
Persistence & Privilege
always is false and there are no indications the skill requests persistent system privileges or modifies other skills; autonomous invocation is allowed by default but not combined with other red flags.
Assessment
This skill appears coherent and low-risk, but consider these practical points before using it: (1) Do not paste sensitive or client-confidential data into the prompts — provide only the facts needed for the script. (2) Review generated ROI figures and implementation timelines for accuracy before sharing with prospects; the model can hallucinate specific numbers. (3) If you plan to publish the scripts as recordings, verify any tool or product claims to avoid misrepresentation. (4) Because this is instruction-only, there is no hidden install or credential access, but always exercise the usual caution about sharing private business data with any third-party skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk979hk0fnr1yjbk61p4g2pm8pn848jxs

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments