cold-start-strategy

v1.3.0

When the user wants to plan cold start, get first users, or launch a new product with zero traction. Also use when the user mentions "cold start," "cold star...

0· 55·0 current·0 all-time
byKostja Zhang@kostja94
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (cold-start/growth tactics) match the SKILL.md content. The skill is instruction-only and does not ask for unrelated binaries, cloud credentials, or system access.
Instruction Scope
Instructions are focused on outreach, channels, and launch sequencing. The only file reads the skill suggests are .claude/project-context.md or .cursor/project-context.md to gather product context — this is reasonable for tailoring advice but is the only scope-expanding action and should be acceptable if those files are meant to hold product notes. The skill does not instruct the agent to read arbitrary system files, access secrets, or transmit data to unexpected endpoints.
Install Mechanism
No install spec and no code files: lowest-risk model (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
No required environment variables, credentials, or config paths are declared. The instructions do not reference other env vars or request secrets.
Persistence & Privilege
always:false (default). Skill can be invoked autonomously (platform default) but does not request permanent presence or modify other skills or system settings.
Assessment
This skill appears coherent and low-risk: it only provides launch and outreach advice and asks (optionally) to read project-context files for tailoring. Before installing, confirm that .claude/project-context.md or .cursor/project-context.md (if present) contain no secrets you wouldn't want read by a skill. Also remember the skill gives outreach templates — follow anti-spam best practices when contacting users. No credentials or installs are requested.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b3w8qxwswzbsrdp6ez4j9f984ekep

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments