Marketing Copywriting
v1.0.0Generate marketing copy, emails, and promotional content based on customer personas with multi-style rewriting capabilities
⭐ 0· 225·1 current·1 all-time
by走过@1970168137
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name and description (marketing copy, emails, promotional content, persona-based rewriting) align with the SKILL.md instructions. There are no unexpected dependencies, binaries, or credentials declared that would be unrelated to copywriting.
Instruction Scope
SKILL.md asks users to paste business context, data, and documents as input and promises deliverables and implementation guidance. The instructions do not instruct the agent to read system files, environment variables, or call external endpoints beyond normal model invocation. Caution: because it requires user-provided data, users should avoid pasting secrets, personal data, or confidential documents.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes on-disk risk and there is nothing being downloaded or executed on the host.
Credentials
The skill declares no required environment variables, credentials, or config paths. Requested inputs are user-provided content, which is appropriate for a copywriting tool.
Persistence & Privilege
Flags show always:false and normal agent invocation settings. The skill does not request persistent presence or system-level configuration changes.
Assessment
This skill appears coherent for generating marketing content and does not request credentials or install software, but the author/source is unknown and there is no homepage. Before using it: (1) Do not paste secrets, API keys, customer PII, proprietary contracts, or other confidential material — redact or use synthetic data instead. (2) Validate all copy and any recommended 'implementation' scripts or plans with your legal/technical teams before applying. (3) Test with non-sensitive examples to confirm output quality. (4) If you plan to use outputs in production, prefer skills from identifiable publishers or with a homepage so you can assess provenance and support.Like a lobster shell, security has layers — review code before you run it.
latestvk972t4s5734yhmtnr99ma5tqz183d97c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
