Life Coach Video
v1.0.0Assist life coaches in creating authentic 60-90 second videos showcasing their coaching framework, client breakthroughs, and personal transformation stories.
⭐ 0· 35·0 current·0 all-time
by@udnerc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and SKILL.md all describe creating 60–90s coaching videos and the runtime instructions only request typical input (niche, framework, client outcomes). There are no unrelated requirements (no cloud creds, binaries, or system-level access) that would be disproportionate.
Instruction Scope
SKILL.md limits the agent to asking clarifying questions, gathering coaching-relevant details, and producing scripts, scene notes, and b-roll suggestions. It does not instruct reading files, accessing environment variables, or transmitting data to external endpoints. It does ask for client stories/testimonials, which is expected for this purpose but is privacy-sensitive.
Install Mechanism
No install specification or code files are present (instruction-only). This is low-risk — nothing is written to disk or downloaded as part of the skill.
Credentials
The skill declares no required environment variables, credentials, or config paths. The information it requests from users (coaching niche, stories) is proportional to the stated functionality.
Persistence & Privilege
always is false and the skill is user-invocable (normal). It does not request persistent system presence or modify other skills or system configuration.
Assessment
This skill appears coherent and low-risk, but exercise normal caution: do not supply client PII, health, or sensitive data without explicit consent and release forms; obtain permission before using client video/audio or testimonials; review any generated script for accuracy and ethical compliance before publishing; and avoid pasting secrets or account credentials into prompts. If you need the agent to use private files or footage, treat those assets as sensitive and only provide them after confirming appropriate permissions and redaction of personal identifiers.Like a lobster shell, security has layers — review code before you run it.
latestvk973a73mcv4cp4hvhscssra39d840x8n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
