Martial Arts Instructor Video
v1.0.0Creates concise 60-90 second videos showcasing martial arts schools’ training philosophy, instructor credentials, programs, and community culture.
⭐ 0· 33·0 current·0 all-time
by@udnerc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the runtime instructions: the skill asks for martial-arts-specific information (discipline, credentials, rank system, program focus) and generates a 60–90s video script — nothing requested is unrelated to making promotional/training videos.
Instruction Scope
SKILL.md instructs the agent to ask for and gather personal/professional details (instructor credentials, rank history, competition record, student age ranges). That is appropriate for the stated purpose but is privacy-sensitive — the instructions do not reference reading local files, env vars, or sending data to third-party endpoints.
Install Mechanism
No install spec and no code files (instruction-only). This minimizes on-disk code execution and is proportionate for a script-generation skill.
Credentials
The skill declares no required environment variables, credentials, or config paths. It only needs user-provided content about the school/instructors, which is appropriate for its purpose.
Persistence & Privilege
always:false and default model invocation settings. The skill is not force-included and does not request elevated persistence or modify other skills; autonomous invocation is allowed by platform default but not excessive here.
Assessment
This skill appears coherent and low-risk because it only generates short video scripts and asks for martial-arts-specific info. Before installing, consider privacy: avoid supplying minors' full names, private contact details, or sensitive personal data without consent. Because the skill is instruction-only and has no install or credentials, its main risk is accidental disclosure of participant information—verify how you use the generated scripts and who can access them. Also prefer skills from identifiable sources when possible and test with non-sensitive example data first.Like a lobster shell, security has layers — review code before you run it.
latestvk979darbeswaczjsyrd4tzm8rh842ny5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
