Drip director

v1.0.0

Deterministic pipeline for streetwear and fashion images that captures user intent, enforces constraints, generates with Nano Banana Pro, critiques with Gemi...

0· 330·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims a focused image-production pipeline, which plausibly needs a generation model and a critique API. However, SKILL.md lists required binaries (curl, jq, uv), a GOOGLE_API_KEY, and a local Nano Banana Pro installation path; the registry metadata showed none of these. The declared purpose could justify the Google API key and local generator, but the registry/manifest disagreement is an incoherence that should be resolved.
!
Instruction Scope
Instructions instruct the agent to 'silently' analyze user-provided reference images and to run a shell command that enumerates recent inbound media files (ls -t1 ~/.openclaw/media/inbound/ | head -20) and store full absolute file paths in pipeline state. The skill explicitly tells the agent not to display that analysis to the user. This is scope creep relative to a simple prompts pipeline and raises privacy concerns because it reads local files and records absolute paths without explicit, visible user confirmation.
Install Mechanism
There is no install spec and no code files (instruction-only). That lowers installer risk because nothing is downloaded or written by the skill itself. However, SKILL.md requires a locally installed Nano Banana Pro at a specific path — which is a non-installer but a runtime dependency that should be declared in the registry.
!
Credentials
SKILL.md requires a GOOGLE_API_KEY and certain binaries, but the registry metadata lists no required env vars or binaries. Requesting GOOGLE_API_KEY is plausible for calling Gemini for critique, but the manifest omission is an inconsistency. Additionally, the skill asks to capture local absolute file paths; that implies access to potentially sensitive filesystem data not reflected in the registry's 'required config paths'.
Persistence & Privilege
The skill does not request always:true and does not declare other elevated privileges. It asks to maintain PIPELINE_STATE during the session and store image absolute paths there; that is internal persistence. It does not instruct modifying other skills or system-wide configs. Still, storing absolute local paths and 'silent' analysis increases privacy/retention concerns.
What to consider before installing
This skill's core idea (structured image pipeline + external critique) is plausible, but there are notable inconsistencies and privacy-relevant instructions you should address before installing: - Registry vs SKILL.md mismatch: The registry claims no required env vars or binaries, but SKILL.md requires curl, jq, uv, a GOOGLE_API_KEY, and a local Nano Banana Pro installation. Ask the publisher to correct the manifest so requirements are explicit. - Local-file access and silent analysis: The skill directs the agent to run a shell command to list recent inbound media and to 'silently' analyze and store absolute file paths. Only install if you are comfortable the agent will read files under ~/.openclaw/media/inbound and record their full paths. Prefer a version that asks explicit permission before any silent filesystem enumeration. - GOOGLE_API_KEY: Confirm what Google API the key must have access to (Gemini) and limit the key's scope/quotas. Do not reuse a high-privilege Google key; create a dedicated, constrained key for this skill if possible. - Nano Banana Pro dependency: Verify the provenance and safety of Nano Banana Pro (local model/tool). The skill assumes it exists at a specific path — ensure that path and binary are trustworthy before granting the agent access. - Test with non-sensitive data: If you proceed, run the skill only on non-sensitive images first to observe exactly what files it reads and what it transmits externally. - Ask for transparency changes: Request the author remove 'silent' analysis, or at minimum make the filesystem-analysis step explicit and require the user's permission before running ls or collecting file paths. Given the inconsistencies and the privacy-bearing actions in the instructions, treat this skill as suspicious until the manifest is corrected and the silent file-access behavior is clarified or removed.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c0mmx8h7k5fxz5b75hrfn6s81v8vv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments