Xurl

v1.0.0

Analyze Twitter content to uncover WordPress and Shopify client pain points, craft authority-building posts, and generate qualified inbound lead insights.

7· 10.1k·665 current·679 all-time
byGaurang Zalariya@gaurangzalariya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name and description match the runtime instructions: the skill analyzes Twitter content to extract pain points, content angles, and lead signals. It does not request unrelated binaries, credentials, or system access.
Instruction Scope
SKILL.md says the skill processes Twitter content you provide (copied text or URLs). It explicitly states it does not use the Twitter API. However it references local guidance files (references/*.md) that are not present in the package, and the guidance is fairly high-level — this could lead to inconsistent behavior unless the agent's exact actions (e.g., whether to autonomously fetch URLs) are constrained by the caller. Recommend clarifying whether the agent should fetch external pages or only process pasted text.
Install Mechanism
No install spec and no code files are present. This is the lowest-risk model from an install perspective: nothing will be written or executed on disk by an installer.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportional for the stated purpose of analyzing user-provided Twitter content.
Persistence & Privilege
always is false and there are no indications the skill requests persistent or elevated privileges. The default ability for the agent to call the skill autonomously is normal and not by itself a concern here.
Assessment
This skill appears coherent and low-risk in that it only processes Twitter content you supply and requires no credentials or installs. Before installing or using it: (1) confirm the missing referenced files (references/*.md) — their absence may mean some functions are underspecified; (2) avoid pasting sensitive/private data (DMs, non-public identifiers); (3) explicitly instruct the agent whether it is allowed to fetch external URLs (if you don't want network fetching, paste page text instead); and (4) if you plan to use it for lead generation, be mindful of privacy and legal considerations when collecting or acting on personal data.

Like a lobster shell, security has layers — review code before you run it.

latestvk973gatzcdwswv08r8f4y90s2x82538h

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments