Uniform Store Video — Catalog and Fitting Guide Videos for Uniform Suppliers and Workwear Retailers
v1.0.0Provides uniform suppliers and retailers with product, customization, and fit videos to support bulk ordering and institutional customer retention.
⭐ 0· 41·0 current·0 all-time
by@udnerc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description align: the skill describes producing catalog, customization, and fit videos and requests no unrelated binaries, environment variables, or configuration paths.
Instruction Scope
SKILL.md is purely descriptive and contains no operational commands, external endpoints, or file/system access instructions. It is high-level and leaves implementation details unspecified (e.g., how video assets are created or stored), which is not a security problem but does grant broad discretionary behavior unless the platform constrains it.
Install Mechanism
No install spec and no code files — nothing will be written to disk or fetched during install by this skill definition.
Credentials
The skill requests no environment variables, credentials, or config paths; there is no disproportionate credential request.
Persistence & Privilege
always is false and the skill does not request elevated persistence or access to other skills' configurations. Autonomous invocation is allowed (platform default) but not excessive here.
Assessment
This skill is instruction-only and internally consistent with its stated purpose. Before enabling it, consider: 1) the SKILL.md is high-level — verify how the agent will produce or access video assets and whether it will ask to upload/download files or call external services; 2) confirm the agent does not request any credentials or sensitive files at runtime without explicit consent; 3) if you plan to supply customer or employee imagery, ensure that privacy and permission controls are enforced (the skill doesn't mention handling of PII or consent); and 4) monitor permission prompts the first few times the skill runs to ensure it only performs expected actions. If you want stricter controls, ask the developer to add explicit operational boundaries (which services may be called, data retention rules, and no automatic access to system files).Like a lobster shell, security has layers — review code before you run it.
latestvk976pnyth5y54swpem5a6z1mh983zgy7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
