Launch
v1.0.0A comprehensive AI agent skill for founders, creators, and makers launching anything. Builds your launch strategy, prepares your messaging, sequences your pr...
⭐ 0· 284·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (launch strategy, messaging, sequencing) match the provided SKILL.md content. There are no declared binaries, environment variables, or config paths that would be disproportionate for a launch-planning assistant.
Instruction Scope
The SKILL.md is a prose guide for planning and executing launches; it does not instruct the agent to read system files, environment variables, or send data to external endpoints. The instructions remain within the marketing/strategy domain rather than expanding into unrelated system access.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. That minimizes on-disk risk and there is nothing being downloaded or installed by the skill itself.
Credentials
No required environment variables, credentials, or config paths are declared. For its stated function (launch guidance) that is proportionate and expected.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges. It does not modify other skills or system-wide settings.
Assessment
This skill appears to be a self-contained, instruction-only launch strategist and is internally coherent. Before installing or using it, remember: (1) provenance is unknown (no homepage/source repo) — treat the skill like third-party advice rather than an audited tool; (2) do not paste secrets, API keys, or private files into prompts — the skill does not need them; (3) if the skill later asks to connect to your accounts or access files, verify why that access is needed and prefer explicit, minimal-scope credentials; (4) review any generated launch plans before executing operational steps (e.g., publishing, emailing) to avoid accidental data exposure or unintended actions.Like a lobster shell, security has layers — review code before you run it.
growthvk973mbykyde005qv0vgz3t0ea582g6xvlatestvk973mbykyde005qv0vgz3t0ea582g6xvlaunchvk973mbykyde005qv0vgz3t0ea582g6xvmarketingvk973mbykyde005qv0vgz3t0ea582g6xvproductvk973mbykyde005qv0vgz3t0ea582g6xvstartupvk973mbykyde005qv0vgz3t0ea582g6xv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
