Henna Tattoo Video — Design Process and Pattern Gallery Videos for Henna Artists and Mehndi Studios

v1.0.0

Create and showcase henna design process and pattern videos to highlight artistry, speed, style variety, and event professionalism for henna artists and stud...

0· 42·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description describe producing and advising on henna design/process videos. The skill declares no binaries, env vars, config paths, or installs — which is consistent for a guidance/assistant skill that only provides creative and procedural help.
Instruction Scope
SKILL.md is a role-and-purpose description (telling the agent to act as a video assistant). It contains no runtime commands, no references to files, system paths, or unrelated environment variables, and does not instruct the agent to transmit data to external endpoints.
Install Mechanism
No install spec or code is present. Being instruction-only, the skill does not write files or download code, which is the lowest-risk install model.
Credentials
The skill declares no required environment variables, credentials, or config paths. Nothing requested appears disproportionate to its stated purpose.
Persistence & Privilege
Flags show default behavior (not always: true). The skill does not request elevated persistence or modify other skills or system settings.
Assessment
This skill is instruction-only and appears internally consistent and low-risk. Before installing: (1) note that the agent can be invoked autonomously by default — only allow that if you trust the agent's access policies; (2) do not upload or share private client photos, IDs, or sensitive personal data to the skill unless you have permission and understand how the platform will use/store them; (3) if a future version adds an install step or requests API keys or filesystem access, re-evaluate, because those would change the risk profile.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bxsbtz9346ak1647m8d1kj183y7e9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments