Idea to Product

v0.1.1

Turn product ideas into MVPs, UX flows, Playwright checks, and explicit feedback loops. Built by ClawAether.

0· 50·0 current·0 all-time
bywhy@whyy9527
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the provided command specs. No unrelated binaries, env vars, or config paths are required.
Instruction Scope
SKILL.md and the command files only describe producing textual artifacts (MVPs, stories, UX flows, checks, routing decisions). They do not instruct the agent to read system files, access environment variables, or send data to third-party endpoints. The README and command docs reference public URLs but do not require network access.
Install Mechanism
No install spec or bundled code to execute is present; this is instruction-only. A package.json exists but there is no install step that would write code to disk or download external archives.
Credentials
The skill declares no required env vars, credentials, or config paths. There is nothing disproportionate requested for the stated functionality.
Persistence & Privilege
always is false and there is no indication the skill persists configuration or elevates privileges. Autonomous invocation is allowed by default on the platform but the skill does not request extra persistence.
Assessment
This skill appears coherent and low-risk: it is instruction-only, requests no credentials, and does not install or execute code. Before installing, verify you trust the publisher/homepage (the registry lists an owner ID and the SKILL.md links to clawaether.com), and review outputs generated by the skill before acting on them (plans and checks are suggestions, not enforced changes). Because the skill is instruction-only, there’s no runtime sandbox evidence from the package — treat it like a set of templates/prompts and monitor agent actions when you first invoke it.

Like a lobster shell, security has layers — review code before you run it.

latestvk977ry5zt0sghs5rx6z6zn5x8x841g69mvpvk977ry5zt0sghs5rx6z6zn5x8x841g69playwrightvk977ry5zt0sghs5rx6z6zn5x8x841g69productvk977ry5zt0sghs5rx6z6zn5x8x841g69workflowvk977ry5zt0sghs5rx6z6zn5x8x841g69

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🛠️ Clawdis

Comments