Idea To Post
v0.1.0Expand scattered ideas into in-depth posts. Use this skill when users need to "expand ideas," "generate posts," "brainstorm content," "writing assistance," "...
⭐ 0· 117·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (expand ideas into posts) align with the instructions and supporting documents: progressive questioning, framework-guided structure, web search integration, and multi-platform output are expected capabilities and are justified by the skill's purpose.
Instruction Scope
Runtime instructions focus on multi‑round questioning and selective web searching to gather supporting evidence. This is appropriate for the stated goal, but the skill explicitly asks for real cases, emotions, and personal examples — users should avoid sharing sensitive or proprietary information. It also instructs the agent to 'internalize' frameworks and not explicitly state them, which is stylistic (not a functional security issue) but worth noting for transparency.
Install Mechanism
No install spec or code files are present; the skill is instruction-only, so nothing is downloaded or written to disk during install. This is the lowest-risk model and consistent with the skill's declared metadata.
Credentials
The skill requests no environment variables, credentials, or config paths. Declared allowed tools include AskUserQuestion and web search/web reader tools which match the described search-and-question behavior.
Persistence & Privilege
always is false and the skill does not request elevated or persistent system privileges. The default ability for the agent to invoke the skill autonomously remains enabled (standard platform behavior) and is not combined with other concerning flags.
Assessment
This skill appears coherent and focused on content expansion. Before using it, remember: (1) it will ask multiple rounds of questions and may request real examples and emotional details — do not share PII, secrets, proprietary metrics, or any confidential company data; (2) it relies on web search/web‑reader tools to fetch supporting sources — verify citations and the web reader's configuration if you require authoritative sourcing; (3) the skill's guidance to 'not expose framework names' is a stylistic choice for output tone, not a security feature; (4) no credentials or installs are required, so installation risk is low. If you need stricter privacy or oversight, use it in an interactive (user-invoked) mode only and avoid providing confidential inputs.Like a lobster shell, security has layers — review code before you run it.
latestvk97dzrsjrt2r00jj2nfamavzk9833qb3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
