Product Launch

v0.1.0

Plan and execute a product launch for a solopreneur business. Use when launching a new product, feature, service, or major update. Covers pre-launch strategy...

2· 630·3 current·3 all-time
byJatin Khatri@jk-0001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (product launch playbook) matches the SKILL.md content. It asks for no binaries, env vars, or config paths — nothing here is unnecessary for a planning/playbook document.
Instruction Scope
SKILL.md contains step‑by‑step marketing and execution guidance (timelines, content, channels). It does not instruct the agent to read local files, access environment variables, call external endpoints, or exfiltrate data. All actions are human-facing tasks (write content, post to social, engage with community).
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk or downloaded as part of the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. There is no request for unrelated secrets or broad access.
Persistence & Privilege
always is false and the skill does not request persistent or system-wide privileges. It does not modify other skills or agent settings.
Assessment
This playbook is coherent and low-risk because it is purely instructional and requests no system access. Before you use it: (1) note the skill owner/homepage are unknown—treat it like generic public advice and cross-check against other reputable launch guides; (2) when following the advice, avoid posting sensitive or proprietary data publicly and don’t paste API keys or passwords into any posts or tools; (3) respect platform/community rules (avoid spammy posting); (4) if you plan to automate any of these steps later (scheduling posts, connecting email services), only grant credentials to trusted apps and review those apps' scopes; (5) if you want provenance, ask the publisher for author credentials or references.

Like a lobster shell, security has layers — review code before you run it.

latestvk970wg6s9mz3ny54ghhdyg3jd181hdt3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments