Referral Program Strategy

v1.0.0

Designs referral and affiliate program structure for startups. Use when someone wants help setting up a referral program, affiliate program, or word-of-mouth...

0· 100·0 current·0 all-time
byDaniel Yu@c0ldsmi1e
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md: it asks product/business questions and produces program recommendations. There are no unrelated requirements (no binaries, env vars, or installs) that would be inappropriate for a strategy consultant skill.
Instruction Scope
Runtime instructions are limited to asking discovery questions and producing a tailored program plan (incentives, mechanics, promotion, affiliate tactics, action plan). The SKILL.md does not instruct the agent to read files, access environment variables, or transmit data to external endpoints beyond listing public resource links.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing will be downloaded or written to disk. Lowest-risk category for install behavior.
Credentials
Requires no environment variables, credentials, or config paths. The only inputs are user-provided business details (product, pricing, budget, active users), which are proportional to the stated purpose.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent privileges or modify other skills or system settings. Autonomous invocation is allowed by default but not combined with other red flags here.
Assessment
This skill appears coherent and low-risk: it only asks for product/business details and returns referral/affiliate program advice. Before using it, avoid pasting sensitive secrets or raw customer PII (customer lists, payment processor credentials, API keys). If you later implement recommendations with third-party services, connect those services through their official integrations rather than typing credentials into the chat. Also glance at the external links before clicking them (they point to public articles and an archived page). If you want higher-assurance implementation help (code, tracking setup, payment wiring), prefer skills or vendors that clearly state which credentials and integrations they need and why.

Like a lobster shell, security has layers — review code before you run it.

latestvk979g2emqcc1c9ddtqe10xh24h83a6pw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments