Watermark

v1.0.0

Watermark reference — visible and invisible watermarking, steganography, copyright protection, detection. Use when implementing watermarks for images, docume...

0· 158·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (watermarking, visible/invisible, steganography, detection) align with the included SKILL.md and a local script that prints guidance. Nothing requested (no env vars, no binaries) appears unrelated to the stated purpose.
Instruction Scope
SKILL.md instructs the agent to run a local script (scripts/script.sh) with commands like 'intro', 'visible', 'invisible', etc. The provided script is a set of cmd_* functions that print reference material; it does not reference external endpoints, read system config paths, or access environment variables in the reviewed portions.
Install Mechanism
No install spec is present and the skill is instruction-only plus a bundled shell script. This is low-risk: nothing is downloaded or written to disk at install time beyond the existing packaged files.
Credentials
The skill declares no required environment variables or credentials and the instructions/packaged script do not require secrets. There are no disproportionate or unexplained credential requests.
Persistence & Privilege
always is false and the skill does not request persistent/privileged system presence. It doesn't modify other skills or system configuration according to the provided files.
Assessment
This skill is a local reference/help package for watermarking and appears self-contained: it prints documentation from a bundled script and does not ask for credentials or perform network calls. Before installing, you may want to (1) quickly scan the full scripts/script.sh to confirm there are no hidden commands that run external tools or contact remote URLs, (2) consider that steganography and watermarking techniques can be dual-use — be mindful of legal and ethical constraints when applying them, and (3) if you plan to embed watermarking into production systems, prefer well-maintained libraries (Digimarc, Cloudinary transforms, ImageMagick/Sharp) rather than manual shell scripts. Overall this skill is coherent with its description and low-risk, but always review third-party code and repository provenance for additional assurance.

Like a lobster shell, security has layers — review code before you run it.

latestvk97eccbfvxfj1y15422vmdpzd183ajgd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments