Digital Marketing

v1.0.0

Professional career roadmap platform that generates personalized digital marketing learning paths based on user experience, skills, and goals.

0· 35·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description match the provided SKILL.md and openapi.json: both describe endpoints to generate personalized digital-marketing roadmaps. There are no extraneous credential requests, binaries, or unrelated capabilities.
Instruction Scope
SKILL.md contains API request/response examples and endpoint definitions limited to assessment data and roadmap generation. It does not instruct reading local files, system secrets, or contacting unexpected external endpoints.
Install Mechanism
This is an instruction-only skill with no install spec and no code files to run. That minimizes disk/runtime changes and is proportionate to the stated purpose.
Credentials
No environment variables, credentials, or config paths are required. The data fields described (assessmentData, sessionId, userId) are appropriate for a roadmap API and do not imply unnecessary access to other systems.
Persistence & Privilege
always is false and autonomous invocation is the platform default. The skill does not request elevated persistence or modification of other skills or system configuration.
Assessment
This instruction-only skill appears coherent and low-risk: it asks for no installs or secrets. However the source is unknown and no network host/server is specified in the package — before sending real user data, verify the service endpoint, hosting/privacy policy, and TLS. Avoid submitting sensitive PII in assessmentData unless you know where requests will be sent and how they are stored. If you plan to enable autonomous invocation, remember the agent could call the skill without prompting; enable only if you trust the skill's runtime destination and data handling.

Like a lobster shell, security has layers — review code before you run it.

latestvk9793nv2jnqf4frwegtrqtyvvs842tvb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments