Openpecha frontend skill
v1.0.0Create distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or appli...
⭐ 0· 120·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and SKILL.md all describe producing production-grade frontend code and design; there are no unexpected env vars, binaries, or install steps required that would be out-of-scope for a frontend skill.
Instruction Scope
Instructions ask the agent to research, choose bold aesthetics, and implement working HTML/CSS/JS/React/Vue code. This is appropriate for the stated purpose, but the guidance is broad and grants creative discretion (e.g., pulling fonts, animations, or assets from the web). Users should review any external resources (CDNs, fonts, images) the generated code references.
Install Mechanism
No install spec and no code files beyond instruction docs — lowest-risk model. Nothing is written or downloaded by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. Required access is proportional to a design/code generation skill.
Persistence & Privilege
No elevated persistence or always-enabled setting. Autonomous invocation is allowed (platform default) but not combined with other concerning privileges.
Assessment
This skill appears coherent and low-risk: it only provides instructions for creating frontend designs and generating code. Before using generated code in production, review it for external resource references (CDNs, fonts, images, analytics), license issues, and security best practices (avoid inline eval, check CSP, sanitize inputs). If you plan to supply private site code or credentials to the agent for 'review' or 'normalization', avoid sending secrets and instead provide minimal, redacted examples. If you want extra assurance, run the generated code in an isolated environment and audit network requests the app makes.Like a lobster shell, security has layers — review code before you run it.
latestvk9782y1eqwj12fyntbe5twvbx1836tz7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
