Invoice Template

v1.0.0

Free simple invoice generator. Creates clean, professional invoices with your branding. Use when you need to bill a client quickly without complex tracking o...

0· 698·1 current·1 all-time
byKarl Ambrosius@kambrosgroup
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and content all align: the skill is a simple invoice template generator and does not claim any additional capabilities that would require extra access or credentials.
Instruction Scope
SKILL.md contains only template text, examples, and an upsell. It does not instruct the agent to read files, access environment variables, call external endpoints, or collect unrelated system data.
Install Mechanism
There is no install specification and no code files — this is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The skill declares no required environment variables, credentials, or config paths; nothing in the instructions requires secrets or external service access.
Persistence & Privilege
always is false and there is no mechanism to persist or modify other skills or system settings. The skill does not request elevated persistence or privileges.
Assessment
This skill is a lightweight, instruction-only invoice template and appears internally consistent. It does not request credentials or install software. Before installing/upgrading to any paid or automation companion (for example, the referenced "Invoice Tracker" or "Freelancer Revenue Engine"), review that skill’s declared requirements — especially any API keys, payment provider credentials, or install scripts — because automation/tracking features commonly require external access. Also avoid pasting highly sensitive data (full bank account numbers, unredacted SSNs, or private keys) into the agent’s chat unless you trust how the agent logs and handles conversation data.

Like a lobster shell, security has layers — review code before you run it.

latestvk97aqmvsdnx3bpyz3bw0qk1gq581qwgp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments