programmatic-seo
v1.4.0When the user wants to create SEO pages at scale using templates and data—including AI-assisted, grounded copy for per-URL differentiation (vs rigid mail-mer...
⭐ 0· 62·0 current·0 all-time
byKostja Zhang@kostja94
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is an instruction-only guide for programmatic SEO and only references templates, data practices, playbooks, and project-context files. It does not require unrelated binaries, credentials, or installs that would be disproportionate to an SEO playbook.
Instruction Scope
The runtime instructions explicitly ask the agent to read product/ICP sections from .claude/project-context.md or .cursor/project-context.md when those files exist. Reading project context to tailor recommendations is coherent with the skill's purpose, but it does mean the agent will access workspace files if present. No other file reads, env access, or external endpoints are requested in the visible content.
Install Mechanism
No install spec or code files are present; this is instruction-only so nothing is written to disk or downloaded during install.
Credentials
The skill declares no required environment variables, credentials, or config paths beyond optional project-context files. There is no disproportionate request for secrets or external service credentials.
Persistence & Privilege
The skill does not request always: true and uses the platform defaults. It does not request or modify system-wide settings or other skills' configs.
Assessment
This skill looks coherent for providing programmatic-SEO playbooks and tailored recommendations. Before installing, be aware that it will read .claude/project-context.md or .cursor/project-context.md (if present) to tailor outputs — avoid placing sensitive credentials or secrets in those files. Because the skill is instruction-only and has no installs or required credentials, risk is low, but review any suggestions it makes that request you to wire up data sources or automation (databases, spreadsheets, publishing systems) and avoid sharing high-value secrets unless absolutely necessary.Like a lobster shell, security has layers — review code before you run it.
latestvk97etpj9t1j4jztekym7zadcxn84aqv0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
