UI Designer
v1.0.5Design and improve UI components and systems with pixel-perfect, accessible, scalable designs including tokens, libraries, theming, and handoff specs.
⭐ 0· 124·0 current·0 all-time
byTyroneMok@tyronecoh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (UI design, tokens, components, accessibility) match the included SKILL.md and reference files; all required artifacts (tokens, component patterns, accessibility checklist) are present. Note: the package has no homepage or external source URL, so provenance is unknown even though the content itself is coherent.
Instruction Scope
SKILL.md contains high-level, deterministic design instructions and references to local markdown files. It does not instruct the agent to read arbitrary system files, access environment variables, network endpoints, or exfiltrate data.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing will be downloaded or written to disk as part of installation.
Credentials
The skill declares no required environment variables, binaries, credentials, or config paths. The content operates entirely on design guidance and copy/paste-ready CSS — credential requests would be disproportionate but none are present.
Persistence & Privilege
always is false and model invocation is allowed (the platform default). There is no request for permanent presence or modification of other skills or system settings.
Assessment
This skill appears coherent and low-risk: it is instruction-only and requests no credentials or installs. Before using it in production, verify provenance (no homepage/source provided), inspect any generated code before copying into your codebase, check licensing for referenced fonts/assets (e.g., Inter, JetBrains Mono), and run your usual accessibility and security tests on generated output. If you require stronger assurance about origin, ask the publisher for a source repository or official homepage.Like a lobster shell, security has layers — review code before you run it.
accessibilityvk979xr2txscecj3m5jz5zwek7h84f22jcssvk979xr2txscecj3m5jz5zwek7h84f22jdesign-systemvk979xr2txscecj3m5jz5zwek7h84f22jfrontendvk979xr2txscecj3m5jz5zwek7h84f22jlatestvk979xr2txscecj3m5jz5zwek7h84f22jresponsivevk979xr2txscecj3m5jz5zwek7h84f22juivk979xr2txscecj3m5jz5zwek7h84f22jweb devvk979xr2txscecj3m5jz5zwek7h84f22j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
