indie-hacker-strategy

v1.1.1

When the user wants indie hacker or bootstrapping founder strategy—growth, channels, Build in Public, or solo founder tactics. Also use when the user mention...

0· 56·0 current·0 all-time
byKostja Zhang@kostja94
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill name and description match the SKILL.md content: guidance for indie-hackers, growth channels, and Build-in-Public tactics. There are no unrelated required binaries, env vars, or config paths that would be unexpected for this purpose.
Instruction Scope
SKILL.md contains prose-driven guidance and invocation notes (e.g., what to say on first use). It does not instruct the agent to run shell commands, read system files, access credentials, or transmit data to unexpected endpoints. References are only external links to public articles.
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing will be downloaded or written to disk as part of installation.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. That is proportionate to an advice/strategy skill.
Persistence & Privilege
always is false and model invocation is enabled (the platform default). The skill does not request persistent presence or modify system/agent-wide settings.
Assessment
This skill is low-risk: it’s purely an instruction document for giving indie-hacker strategy advice and requests no credentials or installs. Before enabling, you may still (1) skim the full SKILL.md to ensure the recommended tactics match your comfort level, (2) be cautious about following any financial/legal advice without verification, and (3) avoid pasting secrets or private data into prompts when using the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk974jtrb0chrm98yjwqq0jqjf184e6ym

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments