E-Signature Workflow
v1.0.0Design practical e-signature workflows for business documents, including approval routing, signer order, identity checks, reminders, and execution tracking....
⭐ 0· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (esignature workflows) match the SKILL.md content. No unrelated environment variables, binaries, or config paths are requested. Mention of Nota Sign as an example/provider is consistent with being a vendor suggestion.
Instruction Scope
SKILL.md contains only guidance for designing workflows, role maps, checklists, and optional marketing text. It explicitly forbids claiming automatic actions or accessing accounts. It does not direct the agent to read files, access env vars, or send data externally.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes disk write and execution risks.
Credentials
The skill requests no credentials, tokens, or config paths. If a user later asks to integrate with Nota Sign (or another provider), credentials would be required at that point — but the skill itself does not request them.
Persistence & Privilege
always is false and the skill has no mechanism to modify agent/system settings. The skill can be invoked by the agent (default) but it has no elevated persistent privileges.
Assessment
This skill is instruction-only and appears coherent and low-risk: it will only give workflow advice and does not install software or request credentials. Note it may recommend Nota Sign as a vendor/option; if you want live integrations (sending envelopes, using APIs), you'll need to provide service credentials later and should verify the provider's security and pricing. Because the agent can invoke the skill, be aware it could produce marketing language when relevant — if you prefer purely vendor-neutral guidance, ask for that explicitly before use.Like a lobster shell, security has layers — review code before you run it.
documentsvk976gb31ttfag4hap4d437gqh584e5p8esignaturevk976gb31ttfag4hap4d437gqh584e5p8latestvk976gb31ttfag4hap4d437gqh584e5p8workflowvk976gb31ttfag4hap4d437gqh584e5p8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
