Growth
v1.0.0Design and execute growth strategies with acquisition loops, activation, and retention systems.
⭐ 4· 1.2k·3 current·3 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (growth strategy design and execution) aligns with the SKILL.md content: frameworks, checklists, and experiment guidance. There are no unrelated requirements (no binaries, env vars, or config paths).
Instruction Scope
The SKILL.md is high-level playbook content (metrics, funnels, experiments, checklists). It does not instruct the agent to read files, access environment variables, or call external services. One minor note: the description uses the word "execute," but the instructions themselves are advisory — there are no concrete API/CLI steps to perform external actions.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be written to disk or downloaded by the skill.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportionate for an advisory/strategy skill that provides frameworks and checklists.
Persistence & Privilege
Defaults are used (always: false, agent invocation allowed). The skill does not request permanent presence or system-wide configuration changes.
Assessment
This skill is a benign, read-only growth playbook — it provides advice and checklists but does not perform actions or request secrets. Before installing, decide whether you want an agent to be allowed to take real actions (create ads, change landing pages, post content); if so you will need to provide external account credentials separately and should grant only minimal, auditable access. Because the skill can be invoked by the agent, monitor any outbound actions and audit logs if you later connect it to real services. If you only want strategy recommendations, this skill is appropriate as-is.Like a lobster shell, security has layers — review code before you run it.
latestvk97f55m878wtd7ga7m2x9g2qjx80xpsm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📈 Clawdis
OSLinux · macOS · Windows
