QR
v1.0.0Generate, customize, and deploy QR codes with proper sizing, error correction, and use-case optimization.
⭐ 2· 740·3 current·3 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (generate, customize, deploy QR codes) matches the SKILL.md, types.md, and deployment.md content. The guidance references short links and tracking, which are expected for QR deployment and do not require additional credentials in the skill itself.
Instruction Scope
Runtime instructions are limited to design, sizing, error correction, testing, and deployment best practices. They do not instruct the agent to read files, access environment variables, or call external endpoints directly.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes disk writes and arbitrary code execution risk.
Credentials
The skill requests no environment variables, credentials, or config paths. References to dynamic QR services and tracking are advisory only; any credential use would occur only if the user chooses third-party services later.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills/config. Autonomous invocation is allowed by platform default and is not combined with other risk factors here.
Assessment
This skill is low-risk: it's a collection of QR design and deployment best practices and does not ask for credentials or install code. Before using it: (1) be cautious when following its advice to use URL shorteners or analytics — those services may collect click/scan data and require separate accounts/credentials; (2) avoid embedding secrets (WiFi passwords, private payment keys) in QRs that will be publicly visible; (3) when implementing dynamic QRs or payment QRs, use reputable providers and validate regional payment standards; and (4) always test printed QRs at real size and lighting conditions before wide distribution.Like a lobster shell, security has layers — review code before you run it.
latestvk9788fza7tbdkmnh9sfp2hp0918130q3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
