Growth Engineering Mastery

v1.1.0

Design, execute, and measure growth systems — from North Star definition through viral loops, experimentation, and scaling. Complete AARRR+ framework with te...

0· 383·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (growth engineering, AARRR, experimentation) match the content: templates, frameworks, and playbooks. The skill requests no binaries, env vars, or config paths—proportionate for a guidance-only skill.
Instruction Scope
SKILL.md is a playbook with audit templates, experiment design, and statistical rules. It does not instruct the agent to read system files, access environment variables, call external endpoints, or transmit data. It assumes the agent will ask the user for metrics rather than pulling them automatically.
Install Mechanism
No install spec and no code files (instruction-only). This minimizes on-disk risk; README mentions a 'clawhub install' command but the package appears to be guidance-only, so there is no hidden download or archive to review.
Credentials
No required environment variables, credentials, or config paths are declared. That is appropriate for a methodology/playbook that provides templates and advice without integrating directly with analytics or cloud services.
Persistence & Privilege
Skill is not marked always:true and contains no installation steps that would persist credentials or modify other skills. Autonomous invocation is allowed (platform default) but is not combined with other concerning privileges.
Assessment
This skill is a content-only growth playbook and appears coherent and low-risk by itself. Before using it: (1) verify the author/source if you care about provenance (homepage is missing; README links to AfrexAI pages), (2) never paste API keys, database credentials, or analytics tokens into chat — if you want the agent to analyze analytics data, create least-privilege read-only credentials or share sanitized/exported reports instead, (3) treat any paid external links or context packs as third-party products and validate them separately, and (4) test any operational recommendations in a staging environment before applying to production. Overall, the skill is appropriate for advisory use but does not autonomously access your systems or secrets.

Like a lobster shell, security has layers — review code before you run it.

acquisitionvk97fqp1ktzv6y8wepj93scfx3x81v5t1experimentsvk97fqp1ktzv6y8wepj93scfx3x81v5t1funnelvk97fqp1ktzv6y8wepj93scfx3x81v5t1growthvk97fqp1ktzv6y8wepj93scfx3x81v5t1latestvk97fqp1ktzv6y8wepj93scfx3x81v5t1marketingvk97fqp1ktzv6y8wepj93scfx3x81v5t1metricsvk979kkje0rm6kjjcjf438g30s981daa5retentionvk97fqp1ktzv6y8wepj93scfx3x81v5t1startupvk97fqp1ktzv6y8wepj93scfx3x81v5t1viralvk97fqp1ktzv6y8wepj93scfx3x81v5t1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments