LinkedIn Authority — Thought Leadership System
v1.0.1Build genuine LinkedIn thought leadership for any professional or business. Long-form posts, articles, speaker positioning, B2B outreach templates, and a pro...
⭐ 0· 388·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (LinkedIn thought leadership) match the SKILL.md: templates, post frameworks, profile advice, and outreach samples. Nothing in the skill asks for unrelated capabilities (cloud creds, system access, or other services).
Instruction Scope
SKILL.md contains only authoring guidance, post structures, schedules, and message templates. It does not instruct the agent to read files, access environment variables, call external endpoints, or post to LinkedIn via APIs — all operations are content-generation and strategy only.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or downloaded, so installation risk is minimal.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a content/template skill. Note: users should avoid pasting proprietary or sensitive credentials into prompts sent to any generative model.
Persistence & Privilege
always is false and there is no request to modify agent/system configs or persist credentials. The skill does not request elevated or permanent presence.
Assessment
This skill is safe to install from a technical-scope perspective: it only provides content templates and strategy. Before using it, avoid pasting confidential client data or sensitive company metrics into the input fields. If you expect automated posting to LinkedIn, note this skill does not include API integration or credential handling — adding automation would require separate connectors and OAuth tokens, which you should review carefully. Finally, review generated outreach for compliance and accuracy before sending.Like a lobster shell, security has layers — review code before you run it.
b2bvk979xb02xm2pwg70ywgcd4zfj581t4drcontentvk97atg520mt2tan63zt00bbnn981tycwcontent-marketingvk979xb02xm2pwg70ywgcd4zfj581t4drlatestvk979xb02xm2pwg70ywgcd4zfj581t4drlinkedinvk979xb02xm2pwg70ywgcd4zfj581t4drmarketingvk97atg520mt2tan63zt00bbnn981tycwpersonal-brandvk979xb02xm2pwg70ywgcd4zfj581t4drsocial-mediavk97atg520mt2tan63zt00bbnn981tycwthought-leadershipvk979xb02xm2pwg70ywgcd4zfj581t4dr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
