Seo Strategy
v0.1.0Build and execute an SEO strategy for organic search traffic. Use when planning keyword targeting, optimizing content for search engines, building backlinks,...
⭐ 0· 344·0 current·0 all-time
byJatin Khatri@jk-0001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content: a step-by-step SEO strategy covering keyword research, on-page and technical SEO, and link building. Nothing in the metadata asks for unrelated capabilities or credentials.
Instruction Scope
SKILL.md contains procedural guidance and checklists only; it does not instruct the agent to run shell commands, read local files, access environment variables, or transmit data to external endpoints. It references third-party web tools (Google Search Console, PageSpeed Insights) appropriately as resources to use, not as hidden integrations.
Install Mechanism
No install spec and no code files — nothing is written to disk or downloaded. This is the lowest-risk model for a skill of this type.
Credentials
The skill declares no required environment variables, credentials, or config paths. While the guide recommends using services like Google Search Console/Analytics, it does not request or require those credentials in the skill metadata.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent system privileges or modification of other skills' configs.
Assessment
This skill is an instruction-only SEO playbook and poses low direct risk because it does not install code or request credentials. Before acting on its recommendations, be cautious about any steps that require you to grant access to external services (Google Search Console, Analytics, webmaster tools or third-party SEO platforms): only provide the minimum permissions necessary, and verify the legitimacy of any third-party tools you use. Note the skill's source/homepage is unknown — that's not a security flaw by itself for an instructional playbook, but it reduces accountability; if you plan to share sensitive account access based on these instructions, prefer to manually perform the steps or use trusted, official integrations under your control.Like a lobster shell, security has layers — review code before you run it.
latestvk976bcwgew7kq2g3q6ex0ytsmn825vz5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
