changelog-page-generator
v1.0.1When the user wants to create, optimize, or structure a changelog or release notes page. Also use when the user mentions "changelog," "release notes," "what'...
⭐ 0· 90·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the instructions: guidance for structuring changelogs and related output. Nothing requested (no env, no binaries) is unexpected. Small transparency concern: the skill has no homepage/source URL listed (source: unknown), so authorship and maintenance cannot be easily audited.
Instruction Scope
SKILL.md confines runtime behavior to analyzing project context (explicitly: .claude/project-context.md or .cursor/project-context.md) and producing structured changelog guidance and templates. Reading those project-context files is coherent with the stated purpose. It does not instruct reading unrelated system files, environment variables, or sending data to external endpoints.
Install Mechanism
There is no install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded.
Credentials
The skill requires no environment variables, credentials, or config paths. Requested access (reading optional project-context files) is proportional to producing contextualized changelog content.
Persistence & Privilege
always is false and disable-model-invocation is false (normal/autonomy allowed). This is the platform default and not combined with any broad credential access or install behavior, so it does not elevate privilege beyond typical skill operation.
Assessment
This skill is low-risk: it only provides guidance and templates for changelogs and asks to read optional project-context files ( .claude/project-context.md or .cursor/project-context.md ) if present. Before installing, confirm you are comfortable allowing the agent to read those files (they may contain internal planning notes). Note the skill has no listed homepage or source, so you cannot easily audit its author — if that matters, prefer skills with a verifiable source. Otherwise, no credentials or network installs are requested, so the footprint is minimal.Like a lobster shell, security has layers — review code before you run it.
latestvk979spxhnyvmeev5yg592pnbas841nt0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
