AI Photoshoot – API-powered
v1.0.0AI photoshoot — generate a professional photoshoot by combining a character photo and a reference scene
⭐ 0· 22·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (AI photoshoot) match the declared dependency (WESHOP_API_KEY) and the documented endpoints on openapi.weshop.ai. Requesting a single API key for the provider is proportionate to the stated purpose.
Instruction Scope
SKILL.md confines requests to openapi.weshop.ai and documents endpoints for starting runs, polling, and uploading images. It explicitly warns not to send the API key elsewhere. One scope note: the skill expects uploading local images (POST /openapi/agent/assets/images), so the agent will need to read image files the user provides — avoid uploading sensitive photos.
Install Mechanism
Instruction-only skill with no install spec and no code files, so nothing is written to disk during install. This is the lowest-risk install model.
Credentials
Only one environment variable is required (WESHOP_API_KEY) and it is declared as the primary credential. That is appropriate and expected for an API-backed service of this type.
Persistence & Privilege
always is false (not force-included). disable-model-invocation is false (agent may invoke autonomously) — this is the platform default and not unusual, but note autonomous invocation means the agent could call the API without further prompting when invoked by an automated agent workflow.
Assessment
This skill appears coherent and only needs your WeShop API key to call openapi.weshop.ai. Before installing: (1) Confirm you trust WeShop and obtain the key from the official site (SKILL.md links https://www.weshop.ai/tools/ai-photoshoot and an auth page); (2) only set WESHOP_API_KEY if you are comfortable that image files you provide will be uploaded to WeShop; (3) never paste the key into domains other than openapi.weshop.ai and consider using a limited/rotatable key; (4) note that the registry metadata lists no homepage/source — if provenance matters to you, ask the publisher for source/repository details or prefer a skill with verifiable origin.Like a lobster shell, security has layers — review code before you run it.
latestvk9756mk8h9z2bqcjckrzxv3rw984shne
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
EnvWESHOP_API_KEY
Primary envWESHOP_API_KEY
