Content Repurposer Pro
v1.0.0Transform long-form content into multiple formats for distribution. Automatically converts blog posts, articles, or transcripts into Twitter/X threads, Linke...
⭐ 0· 574·1 current·1 all-time
byKarl Ambrosius@kambrosgroup
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (repurpose long-form content into social/newsletter formats) aligns with the SKILL.md examples and outputs. There are no unexpected binaries, env vars, or config paths requested that would be unrelated to content transformation.
Instruction Scope
Instructions are limited to transforming pasted content or content referenced by URL into platform-specific outputs. They do not direct the agent to read local files, system configuration, or secret env vars. One minor ambiguity: the 'Batch Repurpose from URL' examples imply fetching a web page; the skill does not specify a fetch mechanism or request browsing/posting credentials, so the agent would need existing browsing or network capability to retrieve URLs. The instructions do not instruct posting content to external platforms (no credential use).
Install Mechanism
No install spec and no code files; this is instruction-only and does not write code to disk or download external artifacts, which minimizes installation risk.
Credentials
The skill requests no environment variables, secrets, or platform credentials. That is proportionate for a tool that generates drafts but does not publish on behalf of the user. If you later want the skill to auto-post, additional credentials would be required and should be treated carefully.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent inclusion or elevated system privileges. Nothing in the instructions indicates modification of other skills or system-wide settings.
Assessment
This skill appears coherent and low-risk as delivered: it only provides instructions for reformulating content and does not request credentials or install code. Before using it, avoid pasting sensitive or copyrighted material you don't control. If you provide URLs, confirm whether your agent has permission and capability to fetch remote pages. If you later connect this skill to an automated posting workflow, require and store platform tokens separately and only grant the minimum permissions needed. Finally, always review and personalize generated outputs (tone, facts, and quotes) before publishing to avoid errors or unintended disclosures.Like a lobster shell, security has layers — review code before you run it.
latestvk97f1t7zpqf6pkzyfxfchz8qp981qr0t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
