sk-doubao-seedream
v1.0.0支持使用火山方舟 Seedream 系列模型,通过文字描述生成图片或对已有图片进行编辑,包含多版本模型选择。
⭐ 0· 64·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description claim image generation/editing via Volcengine Seedream; code and SKILL.md call Ark API endpoints, list Seedream model IDs, and require only an Ark API key — all consistent.
Instruction Scope
SKILL.md and scripts instruct only to set an API key (via config file or VOLCENGINE_API_KEY), choose models, provide prompts and optional input images; runtime code only reads its config, optionally an input image, and sends requests to the documented API endpoints. No broad file reads, unrelated env access, or unexpected external endpoints are present.
Install Mechanism
No install spec; this is an instruction-only skill with included Python scripts. No downloads, package installs, or archive extraction are performed by the skill files themselves.
Credentials
Only credential use is an API key (via config.json or VOLCENGINE_API_KEY). No unrelated secrets or multiple external credentials are requested; config is stored locally in the skill directory.
Persistence & Privilege
Skill does not request permanent platform-wide privileges (always:false), does not modify other skills, and only writes its own config.json in its skill directory.
Assessment
This skill appears to be what it says: it will send your prompts and any input images to the Volcengine/Ark API and will store an API key (if you choose to save it) in the skill's config.json located in the skill folder. Before installing, confirm you trust the Ark endpoint (https://ark.cn-beijing.volces.com) and only provide an API key that has the necessary image-generation permissions. If you prefer not to store credentials on disk, use the environment variable option or the session-only input path. Also be aware that prompts and images are transmitted to the external API (so avoid sending sensitive images or secrets).Like a lobster shell, security has layers — review code before you run it.
latestvk971d3w593241wavmhv3mmvwr18427n4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
