Moving Company Video

v1.0.0

Creates personalized 60-90 second videos showing moving company processes, building customer trust through clear, transparent service and care details.

0· 36·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the runtime instructions. The skill's goal (generate 60–90s moving-company videos/scripts) aligns with the information it requests from the user; there are no unrelated dependencies or credentials requested.
Instruction Scope
SKILL.md directs the agent to ask the user for video type and service/process details and to produce a script and shot suggestions. It does not instruct reading system files, environment variables, or sending data to third-party endpoints; scope is narrowly focused on generating video content.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be downloaded or written to disk by install steps, so install-related risk is minimal.
Credentials
The skill declares no required environment variables, credentials, or config paths. The data it asks for (service descriptions, claims/insurance process, crew practices) is appropriate for producing the stated output.
Persistence & Privilege
always is false and there are no special persistence or cross-skill configuration changes. The default ability for the agent to invoke the skill autonomously is present but typical and not excessive given the skill's scope.
Assessment
This skill is coherent and low-risk as an instruction-only script generator. Before using it, avoid pasting sensitive or personally identifiable customer data (names, addresses, claims details). Review generated scripts for any inaccurate or legally sensitive claims about insurance or liability before publishing. If you plan to automate runs that include real customer data, ensure you have appropriate consent and data-handling controls in place.

Like a lobster shell, security has layers — review code before you run it.

latestvk977z10fs3jg2r9qnaqe4a6fx5843ts6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments