Product Launch System
v1.0.0Guide product launches end-to-end: assess readiness, design strategy, build pre-launch buzz, manage launch week, and optimize post-launch growth.
⭐ 0· 539·0 current·0 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (product launch guidance) matches the content: templates, scorecards, timelines, and checklists. There are no unrelated requirements (no cloud creds, no binaries) that would be disproportionate to a launch playbook.
Instruction Scope
SKILL.md contains planning frameworks, YAML templates, checklists, and process guidance. It does not instruct the agent to read system files, environment variables, or post data to external endpoints; the guidance is limited to advising the user on launch strategy rather than performing external actions.
Install Mechanism
No install spec and no code files are present. Being instruction-only, the skill does not write to disk or download external artifacts — lowest-risk install profile.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no apparent need for secrets or system access to perform the described planning and checklist tasks.
Persistence & Privilege
always is false and normal autonomous invocation is allowed (platform default). The skill does not request persistent system presence or permissions to modify other skills or system settings.
Assessment
This skill is an instruction-only product launch playbook and appears internally consistent and low-risk: it asks for no installs or credentials. Before using, avoid pasting sensitive secrets or proprietary data into prompts; verify any external links (the README advertises paid "context packs") before following them, and treat outputs as advisory planning guidance rather than automated actions (the skill won’t perform network operations or installs on its own). If you want the agent to act (send emails, post to Product Hunt, etc.), plan how to grant only narrowly scoped credentials for those specific actions.Like a lobster shell, security has layers — review code before you run it.
go-to-marketvk97dj57n79ytsjty38fbrnda89819vv7latestvk97dj57n79ytsjty38fbrnda89819vv7launchvk97dj57n79ytsjty38fbrnda89819vv7marketingvk97dj57n79ytsjty38fbrnda89819vv7productvk97dj57n79ytsjty38fbrnda89819vv7startupvk97dj57n79ytsjty38fbrnda89819vv7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
