distribution-channels

v1.1.0

When the user wants to plan product distribution via marketplaces, app stores, or third-party platforms. Also use when the user mentions "distribution channe...

0· 100·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (distribution channels and marketplace listing guidance) match the SKILL.md content. The skill is purely advisory and does not request unrelated binaries, env vars, or config paths.
Instruction Scope
Runtime instructions are content and workflow guidance for distribution planning only; they do not instruct the agent to read files, access environment variables, call external endpoints, or transmit user data.
Install Mechanism
No install spec and no code files — instruction-only; nothing is downloaded or written to disk.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is nothing disproportionate to its advisory role.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges. Autonomous invocation is allowed (platform default) but is not combined with broad access or installs.
Assessment
This skill appears to be a safe, instruction-only advisory tool for marketplace distribution. Before installing, note: (1) it has no code or installs so it cannot run binaries or write files, (2) it requests no credentials, so there is no direct exfiltration risk from the skill itself, and (3) as with any advisory skill, be cautious about following suggestions that require you to paste sensitive credentials into other systems — the skill may suggest actions that involve external accounts (marketplace dashboards, vendor portals). If you need automated actions (publishing, uploading artifacts), prefer skills that explicitly declare the necessary API credentials and review those requests carefully.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fm0pgq7fs1hmv5dhvhcfh7d833rbg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments