Content Strategy Pro
v1.0.0Creates tailored content strategies with topic clusters, keyword targeting, content calendars, competitor gap analysis, and distribution plans for your niche.
⭐ 0· 114·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (content strategy, topic clusters, calendars, competitor gap analysis) match the SKILL.md. No binaries, env vars, or installs are requested, which is proportionate for a guidance/research-style skill.
Instruction Scope
Instructions stay within the domain of content strategy (gather context, research, map topics, prioritise, calendar, output). The 'Research: Search for top-performing content' step is vague about which tools/sources to use — that can cause the agent to perform web searches or use available browsing plugins. This is expected but worth noting: the skill does not instruct reading unrelated local files or requesting unrelated credentials.
Install Mechanism
No install spec and no code files — lowest-risk, nothing written to disk or fetched at install time.
Credentials
No environment variables, credentials, or config paths are requested. The declared requirements are minimal and appropriate for an instruction-only content planning skill.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent privileges or to modify other skills or system settings.
Assessment
This skill appears to be what it says: a content-strategy advisor with no installs or secret access. Before using: (1) be aware the 'research' step may cause the agent to perform web searches or use external browsing plugins — avoid pasting proprietary content you don't want sent externally; (2) verify any keyword or competitor claims with your preferred SEO tools (the skill won't automatically have access to paid SEO accounts unless you supply credentials); and (3) review and adapt the generated calendar and priorities — the suggestions are advisory and should be validated against your analytics and resources.Like a lobster shell, security has layers — review code before you run it.
bundlevk973dwee5ejdppf931qtwyfj3n83a2z6contentvk973dwee5ejdppf931qtwyfj3n83a2z6latestvk973dwee5ejdppf931qtwyfj3n83a2z6marketingvk973dwee5ejdppf931qtwyfj3n83a2z6strategyvk973dwee5ejdppf931qtwyfj3n83a2z6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
