Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (systematic CPS/affiliate marketing) match the SKILL.md content: selection, content matrix, tracking, SOPs and a 30-day plan. Nothing in the package asks for unrelated capabilities (no cloud credentials, no unrelated binaries).
Instruction Scope
SKILL.md contains only operational guidance (platform choices, metrics, tracking, content and execution steps). It does not instruct the agent to read files, access environment variables, call external endpoints, or transmit data elsewhere.
Install Mechanism
There is no install specification and no code files. That minimizes on-disk persistence and execution risk; the skill is purely documentation/instructions.
Credentials
The skill declares no required environment variables, credentials, or config paths. For the described purpose, this is proportionate because the document is a procedural guide rather than an integrator that would need API keys.
Persistence & Privilege
always is false and default autonomy settings apply. The skill does not request elevated persistence or system-wide configuration changes; no sensitive resources are accessed or modified.
Assessment
This skill is a written playbook for CPS/affiliate marketing and appears internally consistent and low-risk as-is. Because its source/homepage is unknown, consider: (1) it contains guidance only—no code will run or exfiltrate data; (2) if you later want automation or integration with affiliate platforms you'll need to supply platform-specific API keys or tools (those are not requested here); (3) follow platform rules and advertising laws when implementing the tactics; and (4) avoid sharing account passwords or sensitive credentials to untrusted third parties. If you need the agent to perform actions (publish, generate links, or log into platforms), prefer explicit, vetted integrations rather than pasting credentials into free-form instructions.Like a lobster shell, security has layers — review code before you run it.
latestvk976r6v5nrqkj8gd29g9ybm30983cryv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
