PLS Canvas Design
v1.0.0Generates original visual art and posters as PNG or PDF files using defined design philosophies like minimalism, brutalism, or skeuomorphism.
⭐ 3· 2.4k·22 current·22 all-time
byMatt Valenta@mattvalenta
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (generating visual art/posters) match the SKILL.md content. The file contains step-by-step design guidance and concrete Python examples (Pillow and fpdf) for producing PNG and PDF assets, which is proportionate to the stated purpose.
Instruction Scope
Instructions are confined to design guidance and local asset generation. The code examples reference creating images/PDFs and a font file (arial.ttf) but do not instruct reading unrelated system files, accessing external endpoints, or exfiltrating data. The guidance is high-level and does not grant broad discretionary access.
Install Mechanism
There is no install spec (instruction-only), so nothing is written to disk by the skill itself. The examples rely on common Python packages (Pillow, fpdf) but installing those would be a normal, user-initiated action and is not specified by the skill.
Credentials
The skill requests no environment variables, credentials, or config paths. The only implicit runtime dependency is an available font file (e.g., arial.ttf) and Python imaging libraries, which are appropriate for generating images/PDFs.
Persistence & Privilege
The skill does not request persistent or elevated privileges and is not marked 'always'. It does not modify other skills or system-wide configuration in its instructions.
Assessment
This skill is coherent and low-risk: it only provides design guidance and example code for generating PNG/PDF assets. Before using, note that the Python examples assume Pillow and fpdf are installed and a font file (e.g., arial.ttf) is available — install packages yourself from known sources (pip) and verify fonts' licenses. As with any code from an unknown source, review the snippets before running, and execute them in a controlled environment (virtualenv/container) if you are cautious. If you plan to extend the skill to fetch external images or fonts, be mindful of where those resources come from and avoid running untrusted binaries or network code without inspection.Like a lobster shell, security has layers — review code before you run it.
latestvk976zkwaata41qe0txqk206xwn81p6ym
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
