Handyman Video

v1.0.0

Generates concise 45-75 second scripts for handyman videos showcasing service range, reliability, pricing transparency, and customer trust to boost client co...

0· 28·0 current·0 all-time
bypeandrover adam@peand-rover
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md instructions: ask for video type and business details, then generate a 45–75s script. No unrelated binaries, env vars, or capabilities are requested.
Instruction Scope
Runtime instructions are limited to asking the user for business-specific inputs (trades, licensing, service area, booking process, etc.) and producing a short script. The instructions do not direct the agent to read local files, access system credentials, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest install risk (nothing is written to disk or downloaded).
Credentials
No environment variables, credentials, or config paths are requested. The data the skill asks the user to provide is proportional to creating a marketing video script.
Persistence & Privilege
always is false and the skill does not request persistent system presence or to modify other skills/configurations. Note: autonomous invocation is platform-default but not combined with any elevated privileges here.
Assessment
This skill appears coherent and low-risk, but a few practical cautions: do not paste customer personal data or sensitive information (PII) into prompts without consent, especially when including testimonials; verify any licensing or pricing claims the generated script asserts; review and edit generated copy for accuracy and compliance with local advertising rules before publishing; and be cautious if you later wire this skill into automation that posts directly to social platforms or ad accounts — review outputs first.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f1z4wkxv2crkhs89enjhp6d842276

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments