TikTok Ads
v1.0.0TikTok advertising strategy, creative best practices, Spark Ads, and platform-specific optimization
⭐ 12· 2.5k·9 current·9 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description align with the SKILL.md content: creative rules, bidding, targeting, tracking and scaling guidance for TikTok Ads. No unrelated binaries, env vars, or installs are declared.
Instruction Scope
SKILL.md contains only marketing recommendations and operational guidance. It does not instruct the agent to read local files, call external endpoints, install tools, or exfiltrate data. It mentions operational details like creator authorization codes as domain knowledge (informational), not as runtime actions to collect secrets.
Install Mechanism
No install specification or code files — instruction-only skill, so nothing is written to disk or executed during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no disproportionate secrets requested for the stated purpose.
Persistence & Privilege
always is false and autonomous invocation is allowed (platform default). The skill does not request permanent presence or elevated system privileges.
Assessment
The skill is internally consistent and appears to be purely advisory marketing content. However, the publisher/source is unknown and there are no citations — treat recommendations as domain opinions, not guaranteed best practice. Do not paste or share any creator authorization codes, API keys, or other secrets into prompts or chat with the skill; when implementing its recommendations, use official TikTok Ads documentation and authenticated dashboards. Verify budget and conversion guidelines against your account data before applying, and test creatives and targeting in small experiments. If you need higher assurance, ask the publisher for provenance (homepage, organization, references) or prefer skills from known vendors.Like a lobster shell, security has layers — review code before you run it.
latestvk973n3jbs9ysvb50b1f5120c3980wfa9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
