Image
v1.0.4Create, inspect, process, and optimize image files and visual assets with reliable format choice, resizing, compression, color-profile, metadata, and platfor...
⭐ 24· 14.4k·188 current·193 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (image creation, inspection, processing, optimization) matches the provided SKILL.md and the topic-specific files (web, social, ecommerce, photography, branding, screenshots, accessibility, commands). The examples reference image tools (ImageMagick, Pillow, ffmpeg, exiftool, svgo, sharp) that are appropriate for the stated tasks.
Instruction Scope
All runtime instructions are focused on image workflows: choosing formats, inspecting metadata, resizing, cropping, and destination-specific export checks. The commands.md file contains concrete shell/SDK examples; these legitimately show how to run local tools and manipulate files. Caveat: some examples use npx (remote npm execution) and shell commands (e.g., exiftool -all= -overwrite_original), which can modify or strip metadata and — if executed — run code from external registries. That is expected in the context but worth caution before running.
Install Mechanism
No install spec, no code files, and no downloads. This instruction-only skill writes nothing to disk and relies on the user's environment/tools when commands are executed.
Credentials
The skill requires no environment variables, credentials, or config paths. The operations described act on local image files and standard image tools; there are no requests for unrelated secrets or cloud credentials.
Persistence & Privilege
always:false (no forced inclusion). disable-model-invocation is false (normal platform default) so the agent could invoke it autonomously; this is expected and not excessive for an instruction-only helper.
Assessment
This skill is coherent and appears to do what it says: image processing guidance and concrete example commands. Before installing or letting an agent run it autonomously, remember: (1) the examples include shell commands and npx usage — running them can execute local commands or fetch remote npm packages, so avoid running npx commands in untrusted environments; (2) commands like exiftool -all= will irreversibly strip metadata (including GPS) — back up originals if you need to preserve metadata; (3) the skill does not request credentials or contact external endpoints itself, but if you or an agent follow the examples you may run tools that access the network or modify files, so validate commands and outputs first; (4) if you do not want the agent to run local image-processing commands autonomously, disable autonomous invocation for the agent. Overall, the skill is internally consistent and proportional to its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk979r31nrdhd34na04rpgwcw3s82pdrx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🖼️ Clawdis
OSLinux · macOS · Windows
