Client Outreach Automator

v1.0.0

Generates personalized multi-touch cold outreach sequences including emails, LinkedIn messages, and call scripts targeting specific industries and pain points.

0· 60·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md: it generates multi-touch outreach sequences (emails, LinkedIn, call scripts). It requests no binaries, env vars, or installs — which is reasonable for a template-only skill.
Instruction Scope
Runtime instructions are limited to researching industry pain points and generating templates with personalization tokens. The SKILL.md does not instruct reading local files, system paths, or transmitting data to third-party endpoints, nor does it request additional credentials.
Install Mechanism
No install specification and no code files — the skill is instruction-only, so nothing is written to disk or fetched at install time.
Credentials
The skill requires no environment variables, secrets, or config paths. The placeholders in templates (e.g., {{first_name}}, {{company_name}}) are typical for personalization and do not imply secret access.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills/configs. Autonomous invocation is permitted by default but not unusually privileged here.
Assessment
This skill appears coherent and low-risk because it only contains templates and instructions and asks for no credentials or installs. Before using it, consider the following: (1) Source verification — the skill has no homepage and an unknown owner, so prefer to review the SKILL.md yourself before enabling. (2) Privacy & compliance — when filling personalization tokens, avoid pasting sensitive customer data; ensure outreach complies with anti-spam laws (CAN-SPAM, GDPR) and platform rules. (3) Tone and accuracy — review and adapt examples for your brand and industry to avoid misleading claims. If the skill were later extended to access your CRM, send emails on your behalf, or request API keys/credentials, re-evaluate immediately (that would be a significant change in risk).

Like a lobster shell, security has layers — review code before you run it.

latestvk97fxyd7pycxc4feeg03dkm0ss83qz3v

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments