backlink-analysis
v1.0.1When the user wants to analyze backlinks, audit link profile, or identify link issues. Also use when the user mentions "backlink analysis," "backlink audit,"...
⭐ 0· 63·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (backlink analysis/audit) match the SKILL.md content: a framework for assessing link profiles, risk signals, and recommendations. It does not request unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md stays within SEO/backlink analysis scope: identifies domain, tool access, goals, metrics, risk signals, and output format. It suggests using third-party SEO tools (Ahrefs, Semrush, Google Search Console) but does not instruct the agent to read unrelated files, environment variables, or to send data to unexpected endpoints.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing is written to disk or fetched during installation.
Credentials
The skill declares no required environment variables or credentials. Note: actual integrations with external SEO tools would require appropriate API keys or access, but the skill itself does not request them.
Persistence & Privilege
always is false and model invocation is allowed (the platform default). The skill does not request persistent or elevated privileges or modify other skills/configuration.
Assessment
This skill is low-risk: it only provides procedural guidance for backlink audits and does not request credentials or install software. Before using it: (1) avoid pasting API keys or account passwords into chat—if you integrate live tools (Ahrefs/SEMrush/GSC) you'll need to provide their credentials through secure connectors, not free-form chat; (2) be cautious with any disavow recommendations—Google disavow can harm rankings if misused; (3) if you later add tool integrations or an install step, re-check required env vars and install URLs for proportionality.Like a lobster shell, security has layers — review code before you run it.
latestvk973bsj2t9bjmfb32g39s64myx8499am
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
