screenshot-ux-auditor
Turn app screenshots into structured UX, copywriting, and conversion audits with issue severity and recommended fixes.
Best use case
screenshot-ux-auditor is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Turn app screenshots into structured UX, copywriting, and conversion audits with issue severity and recommended fixes.
Teams using screenshot-ux-auditor should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/screenshot-ux-auditor/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How screenshot-ux-auditor Compares
| Feature / Agent | screenshot-ux-auditor | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Turn app screenshots into structured UX, copywriting, and conversion audits with issue severity and recommended fixes.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agent for Cold Email Generation
Discover AI agent skills for cold email generation, outreach copy, lead personalization, CRM support, and sales-adjacent messaging workflows.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
Best AI Agents for Marketing
A curated list of the best AI agents and skills for marketing teams focused on SEO, content systems, outreach, and campaign execution.
SKILL.md Source
# Screenshot UX Auditor
## Purpose
Turn app screenshots into structured UX, copywriting, and conversion audits with issue severity and recommended fixes.
## Trigger phrases
- 审查这个界面
- 截图做 UX 评审
- audit this UI screenshot
- 页面哪里有问题
- 帮我做可用性检查
## Ask for these inputs
- one or more screenshots
- product goal or funnel stage
- target user
- platform web/mobile/desktop
- tone or benchmark
## Workflow
1. Identify the screen type, primary task, and likely user goal.
2. Evaluate using the bundled heuristics checklist.
3. Cluster issues into clarity, hierarchy, trust, interaction, and accessibility.
4. Assign severity and provide fix-first recommendations.
5. Generate an issue log the user can hand to design or engineering.
## Output contract
- audit summary
- issue log CSV/Markdown
- fix priority list
- before/after prompt suggestions
## Files in this skill
- Script: `{baseDir}/scripts/generate_issue_log.py`
- Resource: `{baseDir}/resources/heuristics-checklist.md`
## Operating rules
- Be concrete and action-oriented.
- Prefer preview / draft / simulation mode before destructive changes.
- If information is missing, ask only for the minimum needed to proceed.
- Never fabricate metrics, legal certainty, receipts, credentials, or evidence.
- Keep assumptions explicit.
## Suggested prompts
- 审查这个界面
- 截图做 UX 评审
- audit this UI screenshot
## Use of script and resources
Use the bundled script when it helps the user produce a structured file, manifest, CSV, or first-pass draft.
Use the resource file as the default schema, checklist, or preset when the user does not provide one.
## Boundaries
- This skill supports planning, structuring, and first-pass artifacts.
- It should not claim that files were modified, messages were sent, or legal/financial decisions were finalized unless the user actually performed those actions.
## Compatibility notes
- Directory-based AgentSkills/OpenClaw skill.
- Runtime dependency declared through `metadata.openclaw.requires`.
- Helper script is local and auditable: `scripts/generate_issue_log.py`.
- Bundled resource is local and referenced by the instructions: `resources/heuristics-checklist.md`.Related Skills
Payroll Compliance Auditor
Run a full payroll audit in under 10 minutes. Catches the errors that cost companies $845 per violation.
Devvit Publishing Auditor
A specialized auditor for Reddit Devvit developers to verify app readiness before uploading to the Reddit servers. It ensures compliance with Devvit CLI v0.12.x and Reddit’s publishing standards.
hefestoai-auditor
Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leaves your machine.
clauditor
Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.
web-screenshot
Capture screenshots of web pages running on local or remote servers using Puppeteer in headless Chromium. Use when user asks to screenshot web pages, capture web UI, take website screenshots, or document web application interfaces. Supports login-required SPAs (Vue/React/Angular) by performing form-based authentication before navigating. Generates screenshots and an optional result.json with per-page descriptions.
aws-tagging-auditor
Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams
azure-storage-exposure-auditor
Identify publicly accessible Azure Storage accounts and misconfigured blob containers
aws-security-group-auditor
Audit AWS Security Groups and VPC configurations for dangerous internet exposure
aws-s3-exposure-auditor
Identify publicly accessible S3 buckets, dangerous ACLs, and misconfigured bucket policies
azure-nsg-firewall-auditor
Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure
azure-key-vault-auditor
Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks
aws-iam-policy-auditor
Audit AWS IAM policies and roles for over-privilege, wildcard permissions, and least-privilege violations