抖音运营

v0.1.0

提供抖音运营的可落地指南与SOP。在开展抖音运营相关工作时调用。

0· 323·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (Douyin operations SOP) match the SKILL.md content (publishing cadence, recommendation mechanics, commerce flow, compliance). The only trust/traceability concern is that the source/homepage are unknown, which affects provenance but not functional coherence.
Instruction Scope
SKILL.md contains only marketing/operations guidance and SOP-style bullets. It does not instruct the agent to read files, access environment variables, call external endpoints, or perform system actions outside its stated role.
Install Mechanism
No install spec and no code files (instruction-only). There is nothing to download or write to disk.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate to an operations/SOP guidance skill.
Persistence & Privilege
always is false and model invocation is not disabled (default). Autonomous invocation is the platform default and is not combined with other concerning privileges here.
Scan Findings in Context
[regex-scan-empty] expected: The scanner found no code or regex matches — expected because this is an instruction-only SKILL.md.
Assessment
This skill appears coherent and lightweight: it only provides textual SOPs for Douyin operations and doesn't request credentials or install software. Consider the following before installing: (1) the author/source and homepage are unknown — if provenance matters to you, prefer skills with a verifiable publisher; (2) the skill may generate strategy or copy that you should review for brand/legal compliance before publishing; (3) future updates could add code or require credentials — re-check required permissions if the skill is updated. If you use it, avoid pasting any account passwords, API keys, or private data into prompts.

Like a lobster shell, security has layers — review code before you run it.

latestvk976byr55dhcqk6rhdhsxjw6qs83etsy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments