LinkedIn Follow-up

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill’s goal is coherent, but it uses logged-in LinkedIn and Google Sheets authority to read, store, and send messages, with anti-detection guidance and under-scoped credential/session handling.

Install only if you intentionally want an agent to help manage LinkedIn follow-ups through your logged-in browser and Google Sheet. Before use, verify the Sheet ID is yours, restrict sheet sharing, use a dedicated LinkedIn/browser profile if possible, review every draft and recipient before sending, and be aware that the anti-detection workflow may create account or policy risk.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may act through your Google and LinkedIn accounts, including reading private messages, updating spreadsheets, and sending LinkedIn messages as you.

Why it was flagged

The skill uses Google authorization tokens and an authenticated LinkedIn browser session, while the supplied registry metadata declares no primary credential or required config path.

Skill content
`gog auth` — Run `gog auth list`... `Browser` — Open the openclaw browser profile and confirm LinkedIn is logged in.
Recommendation

Use a dedicated browser profile and least-privileged Google Sheet, confirm the Sheet ID is yours, and require explicit approval before every send or account mutation.

What this means

A wrong draft, wrong recipient, or accidental batch operation could send real messages under your LinkedIn identity.

Why it was flagged

The browser workflow can directly click LinkedIn’s real Send button from the logged-in profile. This matches the skill purpose, but it is an irreversible external account action.

Skill content
### 4d. Send ... if (btn) { btn.click(); return 'sent'; }
Recommendation

Keep the approval step mandatory, verify screenshots and recipients before sending, and avoid unattended or bulk sends.

What this means

Using stealth-like LinkedIn automation may put the user’s account, reputation, or compliance posture at risk.

Why it was flagged

The workflow explicitly includes anti-detection behavior for LinkedIn automation without explaining platform, account, or compliance risks to the user.

Skill content
**Always go to feed first** (anti-detection): `https://www.linkedin.com/feed/`
Recommendation

Remove anti-detection guidance, disclose platform-risk tradeoffs clearly, and prefer official or policy-compliant integration methods.

What this means

Private conversation history may be retained and reused beyond the current task, and anyone with sheet access could see it.

Why it was flagged

The skill stores LinkedIn conversation content as persistent CRM context for later use, which can expose private messages in the sheet and allow untrusted message text to influence future drafts.

Skill content
Append new entries to the existing log in col O... Keep the format consistent so the follow-up skill can parse it in future sessions.
Recommendation

Restrict sheet access, confirm the destination Sheet ID, redact sensitive content, set a retention policy, and treat stored conversation text as untrusted input.