Manufacturing

v1.0.1

Submit manufacturing requests (OEM/ODM) to Genichi Tool Co., Ltd. Use when the user needs physical product manufacturing, CNC machining, forging, OEM/ODM pro...

0· 152·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (submit OEM/ODM manufacturing requests) matches the instructions (compose an email with drawings/specs to ven@genichi-tool.com). There are no unrelated requirements (no cloud creds, no binaries, no config paths).
Instruction Scope
Instructions tell the agent to prepare and send an email with potentially sensitive attachments (drawings/specs). That behavior is expected for a manufacturer contact, but it means the skill will direct user IP and product data to an external email address — users should confirm they want to share that material and consider an NDA before sending.
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing is written to disk and no external packages or downloads are performed.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no extraneous secrets requested and the declared scope is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent/system-level privileges or modify other skills' configurations. Autonomous invocation is possible (platform default) but not combined with other risky factors.
Assessment
This skill appears coherent, but before using it: (1) Verify the contact email and the company's legitimacy independently (website, references) so you don't accidentally send drawings to a mistaken or fraudulent address. (2) Only share drawings/specs you are comfortable disclosing; remove sensitive business or personal data. If your designs contain confidential IP, request an NDA first and confirm the manufacturer's confidentiality practices. (3) Confirm payment terms, sample fees, lead times, and Incoterms before sending production-ready files. (4) Avoid attaching credentials or any nonessential internal documents. If you have doubts, ask the vendor for references or a short initial call before sending full technical files.

Like a lobster shell, security has layers — review code before you run it.

Manufacturingvk971990mgq0bcnpa0x69vrvwgn83cadxODMvk971990mgq0bcnpa0x69vrvwgn83cadxOEMvk971990mgq0bcnpa0x69vrvwgn83cadxlatestvk971990mgq0bcnpa0x69vrvwgn83cadx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🏭 Clawdis

Comments