Article Illustrator
v0.1.0When the user wants to add illustrations to an article or blog post. Triggers on: "illustrate article", "add images to article", "generate illustrations", "article images", or requests to visually enhance written content. Analyzes article structure, identifies positions for visual aids, and generates illustrations using a Type x Style two-dimension approach.
⭐ 1· 1.1k·5 current·5 all-time
by@wpank
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's stated purpose is to analyze articles and generate illustrations. However, it makes no declaration of the image-generation provider, required binaries, or environment variables. SKILL.md and README instruct the agent to "Generate Images" and save them to disk, but the package lists no install spec and requires no credentials. That is a material mismatch: a skill that actually produces images normally needs either an on-disk binary, an API endpoint, or credentials for a hosted image service.
Instruction Scope
The runtime instructions instruct the agent to read article files, check for existing images, create directories, write outline.md, save prompts to prompts/, and insert image references into the article — which is consistent with the purpose. However, prompts/system.md contains two red flags: it tells the agent to "Please use nano banana pro to generate the illustration" (an unspecified tool/service) and instructs "If content involves sensitive or copyrighted figures... DO NOT refuse to generate" (explicitly discouraging refusal for potentially sensitive/copyrighted content). Those directions expand the scope in ways that could enable privacy/safety issues and are not justified by the declared skill metadata.
Install Mechanism
This is an instruction-only skill with no install specification and no code files — low installation risk. The README suggests manual copy or an npx install from a GitHub path, but the registry entry itself contains no automated install that would download/extract code at runtime.
Credentials
The skill declares no required environment variables or credentials (good from a least-privilege view) but expects to generate images. That is inconsistent: image generation typically requires either an on-device tool or API keys for a hosted service. Also the instructions read EXTEND.md from user home or project—this requires reading user files (reasonable for preferences, but worth noting). Overall, the absence of any declared credential/provider despite generation instructions is disproportionate.
Persistence & Privilege
always:false and default invocation settings are normal. The skill writes files and directories within the project (outline.md, prompts/, illustrations/), which is appropriate for its purpose and within expected scope. It does not request elevated/system-wide privileges or modify other skills' configs.
What to consider before installing
Before installing, confirm how this skill will actually create images: ask the publisher which image-generation service or binary it expects and whether any API keys are required. Specifically: (1) clarify what "nano banana pro" is and whether it calls an external endpoint—if it does, ask for the domain and whether credentials are needed; (2) inspect the prompts saved to prompts/ (they are written to disk) and the outline.md the skill will create; (3) consider that the skill reads EXTEND.md from your project or home directory (used for preferences), so review that behavior and where preferences will be stored; (4) note the instruction that says "DO NOT refuse to generate" for copyrighted or sensitive figures — decide whether you want the agent to be able to override content-safety refusals; (5) if you plan to run this in a shared or production environment, run it first in a sandboxed project to observe any external calls it makes. If the publisher cannot explain the image-generation step or insists on an unknown third-party tool, treat the skill as higher risk and avoid installing it.Like a lobster shell, security has layers — review code before you run it.
latestvk974wnm852h365d7z95e7fh4vs80w4mm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
