GDPR Compliance Document Generator

v1.0.0

Generate UK/EU GDPR compliance documents — privacy policies, cookie policies, DPIAs, ROPA, DSAR responses, data breach notifications, and consent forms. Use...

0· 68·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the runtime instructions: the skill generates GDPR documents and the SKILL.md contains templates, legal references, and prompts for business context. There are no unrelated environment variables, binaries, or installs requested.
Instruction Scope
The SKILL.md asks the user for business type and what categories of personal data are processed (which is necessary to tailor documents). It does not instruct the agent to read local files, environment variables, or external endpoints. Because the skill invites details about personal data, users should avoid pasting real sensitive personal data (PII) of third parties into prompts; providing categories and redacted examples is sufficient.
Install Mechanism
No install spec, no code files, and no external downloads — this is an instruction-only skill, which limits on-disk risk.
Credentials
The skill requires no environment variables, credentials, or config paths. Nothing requests access to unrelated services or secrets.
Persistence & Privilege
always is false and there is no indication this skill modifies other skills or system settings. It can be invoked autonomously by the agent (the platform default), which is normal for skills and not problematic here.
Assessment
This skill appears internally coherent for creating GDPR documentation, but keep these practical precautions: (1) Do not paste real personal data (names, emails, health records) of customers/employees into prompts — provide categories or redacted examples instead. (2) Treat generated documents as draft templates: have a qualified solicitor or DPO review them before relying on them for compliance or enforcement. (3) Check that legal citations and retention periods are current for your jurisdiction and business activities. (4) If you prefer tighter control, disable autonomous agent invocation for this skill or only run it interactively so you can vet inputs and outputs.

Like a lobster shell, security has layers — review code before you run it.

compliancevk976zmtsbvmykkxqrnft0tph2s84fsb7data-protectionvk976zmtsbvmykkxqrnft0tph2s84fsb7dpa2018vk976zmtsbvmykkxqrnft0tph2s84fsb7gdprvk976zmtsbvmykkxqrnft0tph2s84fsb7latestvk976zmtsbvmykkxqrnft0tph2s84fsb7privacyvk976zmtsbvmykkxqrnft0tph2s84fsb7ukvk976zmtsbvmykkxqrnft0tph2s84fsb7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments