AI Model for Clothing Brand – API-powered
v1.0.0Fashion model photos — replace the model, swap the scene or background while keeping the garment
⭐ 0· 43·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, declared primaryEnv (WESHOP_API_KEY), and the SKILL.md endpoints (openapi.weshop.ai) are consistent. The single required env var is directly related to the API service the skill integrates with.
Instruction Scope
The SKILL.md correctly instructs calls to WeShop endpoints (start runs, poll status, upload images). It warns to only send the API key to openapi.weshop.ai. One operational detail to note: uploading local images via POST /openapi/agent/assets/images will transmit image data (which may include faces or other sensitive content) to WeShop — users should be aware of privacy implications.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing is written to disk or downloaded by the skill itself.
Credentials
Only one credential (WESHOP_API_KEY) is required and it is the logical credential for calling the documented API. The SKILL.md explicitly instructs using the raw key in Authorization headers and cautions not to send it elsewhere.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed. The skill does not request permanent presence or attempt to modify other skills or system configs.
Assessment
This skill appears coherent, but before installing: (1) Only provide an API key you trust to be used with openapi.weshop.ai; never paste the key into other domains or third-party prompts. (2) Understand that uploading images will send those images (possibly containing faces or private information) to WeShop — test first with non-sensitive images. (3) Review WeShop’s privacy/TOS and consider using a scoped or revocable API key and rotating it regularly. (4) Because the skill is instruction-only (no install), the main risk is data you submit to the API and protection of your API key; monitor usage and network requests if you need additional assurance.Like a lobster shell, security has layers — review code before you run it.
latestvk973ezg96g78c7nz390qpfh6g984v97x
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
EnvWESHOP_API_KEY
Primary envWESHOP_API_KEY
