Product Hunt Launch Strategy

v1.0.0

Builds a Product Hunt launch timeline and strategy. Use when someone wants help planning, preparing for, or optimizing a Product Hunt launch.

0· 89·0 current·0 all-time
byDaniel Yu@c0ldsmi1e
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the SKILL.md: it asks only to collect product/context answers and produce a launch plan. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Runtime instructions are limited to asking discovery questions and producing a structured launch timeline, templates, and checklists. The SKILL.md does not instruct reading system files, environment variables, or sending data to external endpoints beyond including public guidance links.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are required. The skill's needs are minimal and proportional to its purpose.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges or modification of other skills/configs. Autonomous invocation is allowed by default but is not excessive for this type of skill.
Assessment
This skill is instruction-only and internally consistent for creating a Product Hunt launch plan. It does not request credentials or install software, so technical risk is low. Before using: (1) avoid pasting sensitive secrets or full private roadmaps into prompts, since the skill will ask for product details; (2) verify any external links provided by the skill yourself; and (3) treat the skill's recommendations as advisory—validate timing, outreach templates, and legal/brand considerations against your own policy. If you expect the agent to act on behalf of you (post, message, or access accounts), require explicit integrations/credentials separately and only after reviewing them.

Like a lobster shell, security has layers — review code before you run it.

latestvk978rpyz36kz9482q9xc0spcvn83azet

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments