Content Repurposing Engine Pro

v1.0.0

Transform long-form content into native LinkedIn posts, Twitter threads, emails, Instagram captions, or blog articles optimized for each platform’s style and...

0· 79·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (repurposing long-form content into social/email/blog formats) match the SKILL.md prompts and reference templates; there are no unrelated requirements (no env vars, binaries, or config paths).
Instruction Scope
SKILL.md provides explicit copy-and-fill prompts and formatting rules that stay within content transformation scope; it only asks the agent to use the pasted source content and does not instruct reading system files, accessing environment variables, or sending data to external endpoints.
Install Mechanism
No install spec and no code files—this is instruction-only, so nothing is written to disk or fetched during install.
Credentials
The skill requests no environment variables, credentials, or config paths; that is proportionate for a prompt/template-based repurposing skill.
Persistence & Privilege
always:false and default invocation settings; the skill does not request persistent or elevated privileges and contains no instructions to modify agent/system settings.
Assessment
This skill is an offline set of prompts and templates and appears internally consistent. Before using it, remember: (1) anything you paste as 'Source content' will be used by the agent—avoid pasting sensitive personal, customer, or proprietary data; (2) if you plan to have the agent actually post to social platforms, those posting integrations will require separate credentials (not requested by this skill) and you should review those integrations' scopes; (3) review generated text for factual correctness, privacy leaks, and platform policy compliance before publishing.

Like a lobster shell, security has layers — review code before you run it.

content-creationvk97fczmpecwrnscy8yar2k9p1x83r9mwcontent-repurposingvk97fczmpecwrnscy8yar2k9p1x83r9mwemail-marketingvk97fczmpecwrnscy8yar2k9p1x83r9mwlatestvk97fczmpecwrnscy8yar2k9p1x83r9mwlinkedinvk97fczmpecwrnscy8yar2k9p1x83r9mwsocial-mediavk97fczmpecwrnscy8yar2k9p1x83r9mwtwittervk97fczmpecwrnscy8yar2k9p1x83r9mw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments