小红书内容创作
v1.0.0Generate Xiaohongshu (小红书/RED) content optimized for the platform's CES algorithm. Use when: (1) creating xiaohongshu/小红书 posts, (2) writing Chinese social m...
⭐ 1· 3.2k·33 current·35 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description claim to generate Xiaohongshu content and the SKILL.md only contains formatting rules, templates, and an explicit JSON output schema for post content — all consistent with the stated purpose.
Instruction Scope
Instructions confine the agent to generating platform-optimized text, tags, cover prompt, posting time and CTAs. They do not ask the agent to read files, access environment variables, call external endpoints, or collect unrelated system data. They also include safety guidance (limits, content restrictions, and AI labeling).
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate request for secrets or system access.
Persistence & Privilege
always is false and the skill does not request persistent or system-level privileges or modify other skills' configurations. Default autonomous invocation is allowed but not combined with other red flags.
Assessment
This skill appears coherent and limited to content generation, but review before publishing: (1) enforce the #AI生成内容 label and platform rules as it requires, (2) manually audit outputs for accuracy and policy compliance (no medical/financial/political claims), (3) check cover images for copyright or sensitive content if you use an image generator, (4) confirm output lengths/format match any platform API you use to publish, and (5) if you prefer to avoid autonomous posting, restrict the agent's ability to invoke skills automatically or require human approval before publishing.Like a lobster shell, security has layers — review code before you run it.
chinesevk97cyw52vp46ekdnm9z6deq5cd81x3e6contentvk97cyw52vp46ekdnm9z6deq5cd81x3e6latestvk97cyw52vp46ekdnm9z6deq5cd81x3e6redvk97cyw52vp46ekdnm9z6deq5cd81x3e6social-mediavk97cyw52vp46ekdnm9z6deq5cd81x3e6xiaohongshuvk97cyw52vp46ekdnm9z6deq5cd81x3e6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
