Marketing Orchestrator Adarsh
v1.0.1Orchestrates marketing audits by running collectors for Instagram, Meta Ads, SEO, competitors, and website audit, then generates a comprehensive report.
⭐ 0· 263·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md: the skill orchestrates collectors (Instagram, Meta Ads, SEO, competitors, website audit) and then calls a report-generator. It does not ask for unrelated privileges or credentials.
Instruction Scope
Runtime instructions only call other skills via runSkill and aggregate results. The SKILL.md does not instruct reading files, arbitrary env vars, system paths, or sending data to external endpoints beyond invoking other skills. It also documents required input and error handling behavior.
Install Mechanism
No install spec and no code files are included (instruction-only). Nothing is written to disk or downloaded by this skill itself.
Credentials
The skill declares no required env vars or credentials. It notes that the calling framework should handle API keys for external services — which is appropriate for an orchestrator that delegates to collector skills.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or modify other skills' configs. It will run only when invoked.
Assessment
This orchestrator itself appears coherent and low-risk, but it delegates work to collector and report-generator skills. Before installing, verify the registry entries and trustworthiness of each referenced sub-skill (instagram-collector, meta-ads-collector, seo-collector, competitor-finder, website-audit, report-generator). Those sub-skills may require API keys or elevated access and could process or exfiltrate sensitive data; confirm what env vars they request and where their outputs are sent. Also confirm the runSkill names resolve to the intended, trusted implementations in your environment. If you allow autonomous invocation, monitor usage and audit aggregated reports for sensitive content being collected or exported.Like a lobster shell, security has layers — review code before you run it.
latestvk970dcf9mcyr568f79wcpd62hd82e1r7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
