Marketing Orchestrator
v1.0.0Orchestrates marketing data collection from Instagram, Meta Ads, SEO, competitors, and website audits to generate a comprehensive marketing audit report.
⭐ 0· 256·0 current·1 all-time
byAdarsh More@adarshvmore
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (marketing orchestration) matches the SKILL.md: it sequences collectors (Instagram, Meta Ads, SEO, competitors, website audit) and calls a report-generator. It does not request unrelated env vars, binaries, or system access.
Instruction Scope
Runtime instructions are narrowly scoped to validating input, sequentially invoking named sub-skills, aggregating results, and calling a report-generator. This is within purpose. Note: the skill delegates external calls and credential handling to the 'calling framework' and other skills; the orchestrator itself does not describe how to handle sensitive data from those sub-skills.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk and there is no install-time risk from this skill itself.
Credentials
This skill declares no required env vars or credentials, which is proportional. However, it explicitly relies on other collector/reporting skills and the environment to provide API keys and secrets; therefore the effective credential surface depends on those downstream skills (not visible here).
Persistence & Privilege
always:false and no config paths are requested. The skill does not request persistent/system-wide privileges or modify other skills. Autonomous invocation is allowed (platform default) but is not an additional privilege requested by this skill.
Assessment
This orchestrator is internally consistent and lightweight: it only sequences other skills and aggregates results. Its security posture depends on the collector and report-generator skills it calls and on the surrounding runtime that supplies API keys. Before installing or enabling it, verify the provenance and permissions of each referenced sub-skill (instagram-collector, meta-ads-collector, seo-collector, competitor-finder, website-audit, report-generator). Confirm where and how API keys will be stored and used (use scoped, least-privilege keys and short-lived tokens where possible), test the orchestration in a sandbox, and review logs/outputs from each collector to ensure no unexpected data exfiltration. Because the package has no homepage and an unknown source, exercise extra caution and inspect the downstream skills' manifests and code (or restrict the orchestrator to a trusted set of known collectors) before granting it broad access.Like a lobster shell, security has layers — review code before you run it.
latestvk979gv1k3622pz0eb6eck3hjh982bvqq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
