AI Prompt Generator
v1.0.0Generate optimized prompts for AI models including ChatGPT, Midjourney, and code generation. Use when: (1) creating AI prompts for writing, coding, design, o...
⭐ 0· 732·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included code and SKILL.md: both provide local prompt-generation and analysis for various AI platforms. The skill does not request unrelated binaries, environment variables, or external services.
Instruction Scope
Runtime instructions and the Python script operate locally and only produce prompt text and analysis; they do not read external files, access the network, or exfiltrate data. Minor functional incoherence: the SKILL.md describes style/category options but the code's template-selection logic defaults to a 'creative' template when available (it doesn't actually select templates based on the requested subcategory keys like 'algorithm'/'web'), so behavior may differ from user expectations but not a security risk.
Install Mechanism
No install spec is present; the skill is instruction-only + a single Python script. Nothing is downloaded or written to disk by an installer step beyond the skill file itself.
Credentials
The skill requires no environment variables, credentials, or config paths. The code does not reference any secrets or external credentials.
Persistence & Privilege
The skill is not always-enabled and is user-invocable only. It does not modify other skills or system configuration and does not request elevated persistence.
Assessment
This skill appears to be a simple, local prompt-generator implemented in Python and is coherent with its description. Before running: (1) inspect the script (you already have it) and run it in a trusted environment; (2) be aware of a minor functional mismatch between SKILL.md and the template-selection logic (it may not honor some style/subcategory choices exactly); (3) if you plan to integrate this into automation, verify no network calls are added later and avoid providing secrets (none are required). Overall it is low-risk but review any code you run on your machine.Like a lobster shell, security has layers — review code before you run it.
aivk97ddsrm6ympt290ffha0735s981srz3chatgptvk97ddsrm6ympt290ffha0735s981srz3codingvk97ddsrm6ympt290ffha0735s981srz3designvk97ddsrm6ympt290ffha0735s981srz3generationvk97ddsrm6ympt290ffha0735s981srz3latestvk97ddsrm6ympt290ffha0735s981srz3midjourneyvk97ddsrm6ympt290ffha0735s981srz3promptvk97ddsrm6ympt290ffha0735s981srz3writingvk97ddsrm6ympt290ffha0735s981srz3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
