Martial Arts Kids Video
v1.0.0Creates authentic 60-90 second videos showcasing youth martial arts belt progressions and character development to aid parent enrollment and school promotion.
⭐ 0· 36·0 current·0 all-time
by@udnerc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and SKILL.md all describe generating 60–90s scripts and shot suggestions for youth martial-arts schools. There are no requested binaries, environment variables, or config paths that are unnecessary for this purpose.
Instruction Scope
Runtime instructions focus on asking the user for context (style, age groups, belt system, footage types) and producing scripts/b-roll suggestions. The instructions do not direct the agent to read unrelated files, access secrets, or transmit data to unexpected endpoints.
Install Mechanism
This is an instruction-only skill with no install spec and no code files — nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. The data it asks for (school details and footage descriptions) is proportionate to creating a video script.
Persistence & Privilege
always is false and there is no indication the skill modifies other skills or system settings. Autonomous model invocation is allowed by platform default but not required by the skill and does not raise extra concerns here.
Assessment
This skill appears coherent and low-risk from a technical standpoint, but because it involves children and video footage you should: (1) obtain signed parental/guardian release forms before sharing or publishing footage, (2) avoid uploading or requesting personally identifying information (PII) beyond what is necessary, (3) anonymize or blur faces/identifiers if you don't have consent for public use, (4) confirm where edited videos will be stored and who can access them, and (5) treat any submitted footage as private data unless explicit permission for publication is given. Also note that the skill will not access files or credentials on its own — it only uses the context you provide when you invoke it.Like a lobster shell, security has layers — review code before you run it.
latestvk978xt60xafa8m3bnadkc26s01841wbg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
