user-growth - 用户增长

v1.0.0

用户增长技能 - 掌握获客、激活、留存、转化、推荐等全链路增长能力

0· 112·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (user growth / AARRR, experiments, funnels, A/B testing, tools) align with the SKILL.md content. The skill does not request unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md contains marketing frameworks, metrics, experiment design, sample datasets and recommended tools. It does not instruct the agent to run shell commands, read local files, access environment variables, or transmit data to external endpoints. Note: it recommends outreach channels (email/SMS/phone/push) and third‑party analytics tools — using those in practice requires handling PII and compliance checks, but that is outside the skill's runtime behavior.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or downloaded during install.
Credentials
The skill requires no environment variables, credentials, or config paths. Recommended third‑party services (Google Analytics, Firebase, Mailchimp, etc.) are appropriate suggestions for this domain and are not requested by the skill itself.
Persistence & Privilege
always:false (default) and model invocation is normal. The skill does not request elevated persistence or cross-skill/system configuration changes.
Assessment
This skill is a content-only marketing/growth playbook and is internally consistent. Before using its recommendations in production, consider: (1) compliance and privacy — outreach tactics (SMS, email, phone, push) require proper consent and PII handling; (2) measurement accuracy — verify your own analytics events and sampling before running large experiments; (3) ethical limits — avoid dark-pattern or spammy tactics the guide might suggest implicitly; and (4) tool integrations — the skill recommends third-party products but does not integrate or access them, so you will need to configure API keys and permissions yourself. No technical or credential risk is apparent from the skill as provided.

Like a lobster shell, security has layers — review code before you run it.

latestvk974cz6gzbwz9xe42e9850xgf183jxc8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments