Sales Funnel Design
v0.1.0Design and optimize a sales funnel for a solopreneur business. Use when mapping how customers move from first awareness to paying customer, identifying where...
⭐ 0· 615·4 current·4 all-time
byJatin Khatri@jk-0001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name and description describe designing and optimizing sales funnels, and the only artifact is a detailed SKILL.md playbook. There are no unrelated environment variables, binaries, or install steps requested that would be inconsistent with that purpose.
Instruction Scope
The runtime instructions are a written playbook for funnel stages, tactics, and metrics. They do not direct the agent to read local files, access environment variables, or transmit data to external endpoints. The content is scoped to advising about marketing/funnel design.
Install Mechanism
There is no install spec and no code files. No downloads, package installs, or executable components are present, so nothing will be written to disk or run by the platform beyond using the textual instructions.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for an advice/playbook skill that doesn't integrate with external services.
Persistence & Privilege
The skill is not marked always:true and does not request persistent system presence or modification of other skills. Autonomous invocation is permitted by default but is not a significant risk here given the skill's read-only instructional nature.
Assessment
This skill is an instruction-only funnel playbook and appears coherent with its description. You can install and use it without providing secrets or allowing installs. Keep in mind: (1) if you follow its recommendations to connect analytics, calendars, or payment providers later, those integrations will require separate credentials — only provide those to trusted services and review what access they request; (2) when the skill suggests third-party tools (Calendly, analytics, ads), verify links and official domains before entering account information; (3) because the skill can be invoked autonomously by an agent, review any generated actions or messages before they are sent to customers. Overall it is coherent and low-risk.Like a lobster shell, security has layers — review code before you run it.
latestvk97e1jbtdj0ewjy8v0zecv338981rw91
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
