自动化工作流设计
v1.0.0Design and implement automation workflows to save time and scale operations as a solopreneur. Use when identifying repetitive tasks to automate, building wor...
⭐ 0· 23·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the SKILL.md content: a solopreneur-focused automation playbook for Zapier, Make, and n8n. The skill is instruction-only and does not request binaries, env vars, or credentials. Minor inconsistency: the included _meta.json values (ownerId, slug, version, publishedAt) differ from the registry metadata provided, which is a metadata coherence issue but does not change runtime behavior.
Instruction Scope
SKILL.md stays on-topic: identifying automation opportunities, designing workflows, selecting tools, and testing. It instructs connecting third-party services via normal OAuth flows and gives testing/error-handling advice. It does not instruct reading unrelated local files, accessing environment variables, or sending data to unexpected endpoints.
Install Mechanism
No install spec and no code files — the skill is pure documentation/operational guidance. This is low risk because nothing is written to disk or executed by the skill itself.
Credentials
The skill requests no environment variables or credentials. It appropriately advises authenticating to third-party automation services (OAuth) when building workflows; that is expected and proportional to its purpose.
Persistence & Privilege
always:false and it's user-invocable; the skill does not request persistent system presence or attempt to modify other skills or system-wide settings.
Assessment
This skill is an instructional playbook and appears internally consistent; before installing or using it: (1) be aware it recommends connecting third-party services via OAuth—review the scopes those services request before granting access; (2) test automations with dummy data to avoid accidental data leakage or repeated actions; (3) if you handle sensitive data, consider self-hosting (n8n) or restricting scopes; (4) note the metadata mismatch in _meta.json vs. the registry listing—verify the skill's origin/author if provenance is important.Like a lobster shell, security has layers — review code before you run it.
latestvk97fc7gmpmcb1rfja16vb9p08184sx1c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
