LinkedIn Ads Strategy: B2B Campaigns, Targeting, and Lead Generation (WIP)
v1.0.0Run LinkedIn advertising campaigns for B2B: Sponsored Content, Message Ads, Document Ads, and Lead Gen Forms. Covers professional targeting (job title, senio...
⭐ 1· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (LinkedIn B2B ads strategy) aligns with the SKILL.md content: guidance on targeting, formats, bidding and campaign structure. Nothing in the skill claims to perform actions (API calls, account management) that would require additional credentials or capabilities.
Instruction Scope
SKILL.md contains purely advisory content and step‑by‑step strategic guidance. It does not instruct the agent to read files, access environment variables, call external endpoints, or exfiltrate data. No vague ‘gather whatever context you need’ directives that would grant broad discretion.
Install Mechanism
No install spec and no code files are present (instruction-only). This minimizes disk writes or binary installation risk.
Credentials
The skill declares no required environment variables, primary credential, or config paths. The advice does not require access to tokens or secrets; there is no disproportionate credential request.
Persistence & Privilege
Flags: always is false, user-invocable is true, and model invocation is allowed (default). These are reasonable for an advisory skill. The skill does not request persistent presence or system-level configuration changes.
Assessment
This skill is instruction-only and appears coherent with its stated purpose. Before installing or enabling it, verify you are comfortable with the skill's source (homepage/owner) in case future versions add API integrations that would require LinkedIn credentials. If you ever see updates that add an install step, required env vars, or code files, re-evaluate those changes — particularly any new requests for tokens, account access, or network endpoints. Otherwise, this advisory skill poses minimal direct risk.Like a lobster shell, security has layers — review code before you run it.
latestvk976zn5566e9b1a2fqsajh0a4s84p83h
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
