seo-strategy

v1.3.0

When the user wants to plan SEO strategy, prioritize SEO work, or understand the SEO workflow. Also use when the user mentions "SEO strategy," "SEO plan," "S...

0· 95·0 current·0 all-time
byKostja Zhang@kostja94
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the SKILL.md content: guidance on SEO workflow, prioritization, and roadmap. It references complementary skills (seo-audit, keyword-research) which is consistent with a coordinator/advisory role.
Instruction Scope
SKILL.md contains advisory guidance and workflow steps only; it does not instruct the agent to read local files, environment variables, system configuration, or to call external endpoints beyond a static reference link. There is no scope creep requesting unrelated data.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is written to disk and no third-party packages are installed.
Credentials
The skill declares no required environment variables, credentials, or config paths — proportionate for a strategy/advisory skill.
Persistence & Privilege
always is false and model invocation is allowed (the platform default). The skill does not request elevated or persistent privileges or modify other skills' configs.
Assessment
This skill is essentially a written playbook — low technical risk because it does not install code or request secrets. Before installing, consider: 1) the author/source is unknown — verify advice against current SEO best practices and your organization's policies; 2) the skill references other skills (seo-audit, keyword-research) which may themselves request credentials or perform actions — review those skills before allowing autonomous invocation; 3) if you want to limit autonomous agent actions, restrict or review the skill's invocation permissions in your agent settings. If you need programmatic audits or any tooling that accesses your site or accounts, prefer skills that explicitly declare the required credentials and come from a known source.

Like a lobster shell, security has layers — review code before you run it.

latestvk9700w26dpyz651kr8fp56d2n184hg39

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments