Content Repurposer Tool

v1.0.0

Repurpose long-form content (blog posts, articles, newsletters, YouTube transcripts) into platform-optimized social media posts, Twitter/X threads, LinkedIn...

0· 49·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (repurpose long-form content) match the instructions: extract content from URL/YouTube/text/file, analyze, and generate platform-specific posts. No unexpected binaries, credentials, or install steps are requested.
Instruction Scope
Instructions explicitly tell the agent to fetch web content (web_fetch), optionally use a youtube-transcript skill, and read user-supplied file paths (.md, .txt, .html, .pdf). This behavior is consistent with the skill's purpose but means the agent will access remote URLs and any local file paths you provide — review carefully before giving sensitive file paths or links.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest-risk install model; nothing new will be written to disk by an installer.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no disproportionate secret or system-access requests.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or elevated privileges. Normal autonomous invocation is allowed by platform defaults but not excessive here.
Assessment
This skill appears to do what it says: turn content (URLs, pasted text, or files you point it to) into social posts. Before using it, avoid supplying paths to sensitive local files or private URLs you don't want read. Be aware it will fetch the web URLs you give it (and may call a youtube-transcript helper if available). If you need stronger guarantees, ask the publisher for source code or run the skill in a restricted environment; otherwise it's reasonable to use for routine repurposing tasks.

Like a lobster shell, security has layers — review code before you run it.

latestvk978dfbz5a7y6h0cz7b3rdchbx84rrkj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments