social-writer

v1.0.0

Social media copywriting and distillation skill. Transforms any news, dev logs, or external articles into high-engagement, opinionated tech posts with authen...

1· 445·1 current·1 all-time
byAIWareTop@hacksing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (social copywriting) matches the SKILL.md and prompt: both provide detailed instructions for turning source text into short, opinionated social posts. The declared requirements (no env vars, no installs) are proportionate to that purpose.
Instruction Scope
The instructions are narrowly focused on formatting and voice for social posts and do not instruct the agent to read system files, credentials, or external endpoints. However the Use Cases mention converting 'local debugging logs' and 'scheduled content patrol', which could encourage users to feed private/confidential data or automate posting — the skill itself does not include safeguards or explicit warnings about sanitizing sensitive inputs.
Install Mechanism
No install spec and no code files (instruction-only). This is low-risk: nothing will be written to disk or downloaded during install.
Credentials
The skill declares no environment variables, credentials, or config path requirements, which is appropriate for a text-processing prompt-only skill.
Persistence & Privilege
always is false and there is no indication the skill modifies agent/system configuration. The skill will be available for invocation (normal default); autonomous invocation is allowed by platform default but is not requested by the skill itself.
Assessment
This skill appears coherent and low-risk as-is, but you should avoid pasting any private logs, API keys, or confidential architecture into the input you give it. If you plan to automate or schedule posts, ensure a human reviews outputs before they go live (the prompt produces public-ready copy and could unintentionally leak sensitive details). Also consider adding an internal policy or a pre-processing step to redact secrets and PII from any inputs before calling the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fkdw8h1ccwrj2x3fy9hthz98217t9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments