Google Fonts

v1.0.0

Load Google Fonts with proper performance, subsetting, and proven font pairings.

2· 838·0 current·0 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Google Fonts performance, subsetting, pairings) matches the SKILL.md content. The skill requests no binaries, env vars, or installs — which is appropriate for a documentation-style helper.
Instruction Scope
SKILL.md contains only best-practice guidance (link tags, font-display, subsetting, pairings, self-hosting notes). It does not instruct the agent to read local files, access unrelated credentials, or transmit data to unexpected endpoints. It mentions third-party helper tools only as an optional recommendation.
Install Mechanism
No install spec and no code files — lowest-risk, instruction-only surface. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths, which is proportionate to a documentation-style font guidance skill.
Persistence & Privilege
always:false and default invocation settings (agent may invoke autonomously) are appropriate. The skill does not request persistent presence or elevated privileges.
Assessment
This skill is a plain guide for using Google Fonts and appears coherent and low-risk. Things to consider before installing: (1) Google Fonts served from Google will contact Google servers and log IPs — if GDPR/privacy is a concern follow the SKILL.md advice to self-host (self-hosting requires you to fetch font files using a tool and host them on your CDN). (2) The skill is instruction-only, so it won't install code itself, but if an agent acts on its advice it might modify site HTML/CSS or download font files — review any actions before allowing them. (3) The skill mentions third-party helpers (e.g., google-webfonts-helper); vet those tools separately if you plan to use them. Otherwise this skill's content, scope, and requested access are proportionate to its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk97brjbmsr5mbpr79yyzv28m0s80wtvd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔤 Clawdis
OSLinux · macOS · Windows

Comments