Social Media Strategy
v1.0.0Advises on building-in-public, social listening, and platform selection for startup social media marketing. Use when someone wants help with their social med...
⭐ 0· 308·1 current·1 all-time
byDaniel Yu@c0ldsmi1e
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (startup social media strategy) aligns with the SKILL.md: asking discovery questions and producing platform recommendations, content plans, listening setup, and action items. It does not request unrelated credentials or system access.
Instruction Scope
Runtime instructions are limited to asking the user questions and producing tailored strategy content. The SKILL.md does not instruct the agent to read local files, environment variables, or transmit user data to external endpoints. It does recommend third-party tools and public links, which is expected for this domain.
Install Mechanism
No install spec or code files are present; this is instruction-only, which minimizes risk. Nothing will be written to disk or installed by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. It requests only user-provided answers to discovery questions — proportional to its purpose.
Persistence & Privilege
always is false and autonomous invocation is not disabled (default). There is no installation step or self-modifying behavior; the skill does not request persistent system presence or modify other skills.
Assessment
This skill is low-risk because it is instruction-only and asks you for information explicitly rather than accessing system resources. Before using it, consider: (1) avoid pasting secrets or sensitive internal data into the conversation; (2) vet any third-party tools or links it recommends (e.g., F5 bot or guides) before signing up or installing anything; and (3) treat its strategic recommendations as guidance — verify tactics against your company policies and privacy requirements before acting on them.Like a lobster shell, security has layers — review code before you run it.
latestvk9784tzcxasqx44t58z5ta8w1d83f8ke
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
