Seedance 2.0 Guide

v1.0.3

Professional Seedance 2.0 / Jimeng (即梦) Storyboard & Prompt Engineering Guide. Create movie-grade 9:16 vlogs, cinematic AI video prompts, and auto-audio scri...

1· 98·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Seedance 2.0 storyboard & prompt director) align with the SKILL.md and example templates. The skill is instruction-only and does not request unrelated binaries, environment variables, or config paths.
Instruction Scope
Instructions stay within the stated purpose: they describe how to ask for multimodal assets and produce storyboard/prompt templates. As a note, several templates describe motion/expression transfer and 1-to-1 restoration which can be used to create high-fidelity likenesses; the skill itself only generates prompts and does not contain code that performs model calls or exfiltrates data.
Install Mechanism
No install spec is provided (instruction-only). Nothing is written to disk and no third-party packages or remote downloads are requested.
Credentials
No environment variables, credentials, or config paths are required. The SKILL.md references only user-supplied multimodal assets (@image/@video/@audio) and does not access undeclared secrets.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills/configurations. Autonomous invocation is allowed by platform default but not excessive here.
Assessment
This skill is a prompt/storyboard authoring guide and appears internally consistent. Before using it, avoid uploading sensitive or identifiable people's images/videos unless you have permission — advanced templates (motion/expression transfer, 1-to-1 restoration) can facilitate realistic likeness work and may raise privacy or legal concerns. Confirm the target model/service's policy on generating realistic faces or impersonations, and do not supply private credentials or system files (the skill does not ask for them). If you see the skill later request network endpoints, credentials, or an install script, treat that as a red flag and re-evaluate.

Like a lobster shell, security has layers — review code before you run it.

latestvk971awkdqz0rf20vs139x7v87s84g3r0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments