AD Strategy
v1.0.0Plans paid ad campaigns with platform selection and budget guidance for startups. Use when someone wants help with ads, paid acquisition, Google Ads, LinkedI...
⭐ 0· 109·0 current·0 all-time
byDaniel Yu@c0ldsmi1e
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (paid ad strategy for startups) align with the SKILL.md content — it asks appropriate discovery questions and returns platform recommendations, campaign structure, creative guidance, budgeting, measurement, and an action plan. It does not request unrelated services or credentials.
Instruction Scope
Runtime instructions are limited to conversational discovery and producing a tailored plan. The guide references external resources (public links) and suggests 'spying on competitor ads' for inspiration but does not instruct reading local files, environment variables, or transmitting user secrets.
Install Mechanism
No install spec or code files — instruction-only skill. Nothing is downloaded or written to disk.
Credentials
No required environment variables, credentials, or config paths are declared or used. The skill's needs are proportional to its stated function.
Persistence & Privilege
always is false (default) and the skill is user-invocable; autonomous model invocation is allowed by platform default but not in itself excessive here. The skill does not request elevated or persistent system privileges.
Assessment
This skill appears coherent and low-risk: it only contains instructions for conversational ad planning and links to public resources, with no installs or credential requests. Before installing or using it, avoid pasting account passwords or API keys into the chat — if the strategy requires connecting ad accounts, perform those integrations through the platform's official flows rather than sharing credentials. Be cautious following external links and verify any third-party guides before acting on paid ad spending recommendations.Like a lobster shell, security has layers — review code before you run it.
latestvk9793zx4kbdpfhzmzx3gjrq0js836qfp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
