Drone Videography Video
v1.0.0Create 45-60 second aerial showcase videos highlighting FAA certification, drone skills, specialties, and cinematic footage to boost your drone portfolio.
⭐ 0· 34·0 current·0 all-time
by@udnerc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md: the skill only needs operator-supplied info (certification, equipment, specialties) to generate a short portfolio script. No unrelated credentials, binaries, or system access are requested.
Instruction Scope
Runtime instructions are limited to asking the user for contextual details and producing a script/shot list. They do not direct the agent to read files, access system paths, call external endpoints, or exfiltrate data.
Install Mechanism
There is no install spec and no code files — instruction-only skills carry minimal disk or network risk. Nothing is downloaded or executed.
Credentials
The skill declares no environment variables, credentials, or config paths. The requested inputs (FAA status, equipment, specialties) are appropriate and proportional to the stated goal.
Persistence & Privilege
Flags are default (not always), and the skill does not request persistent privileges or to modify other skills or system settings.
Assessment
This skill appears coherent and low-risk, but before using it: (1) avoid pasting or uploading sensitive documents (full government IDs, unredacted contracts) into the chat—share only the specific certification/status details needed; (2) confirm any footage you provide is owned by you or covered by release forms and that you have rights to music/assets used; (3) if you later integrate this output with external editing or hosting services, keep those credentials separate and verify their privacy policies; (4) if you want the agent to handle actual media files, ask the platform how media are stored/retained. If any instruction or prompt from the skill asks to access local files or external URLs, treat that as a red flag and pause.Like a lobster shell, security has layers — review code before you run it.
latestvk97eawarsxhn199gy2ex6y7b0d842h15
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
