Social Media Mgmt
v1.0.0Generate personalized career roadmaps for social media management professionals with specialization paths and structured learning plans.
⭐ 0· 28·0 current·0 all-time
byToolWeb@krishnakumarmahadevan-cmd
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (career roadmaps for social media managers) aligns with the provided SKILL.md and the OpenAPI spec: endpoints, request/response examples, and pricing are all consistent with that purpose. There are no unrelated required binaries, env vars, or config paths.
Instruction Scope
Runtime instructions describe accepting assessment data (experience, skills, goals) and returning a roadmap. The SKILL.md does not instruct reading system files, environment variables, or other unrelated state. The only data it asks for is user assessment data consistent with its function.
Install Mechanism
Instruction-only skill with no install spec and no included code files; nothing is written to disk and no third-party packages are fetched. This is the lowest-risk install profile.
Credentials
The skill declares no environment variables, credentials, or config paths. The data it expects (user assessment payload) is appropriate for a roadmap-generation service and does not require unrelated secrets.
Persistence & Privilege
always is false and the skill does not request persistent or elevated system privileges. It does not modify other skills or system settings.
Assessment
This skill appears coherent for generating personalized career roadmaps, but note: it expects user assessment data (experience, skills, goals) so you should confirm you are comfortable the agent will send that information to an external service. Because the source and homepage are unknown, consider: (1) verifying the vendor or endpoint before sending real personal data, (2) testing with dummy data first, (3) ensuring network calls use HTTPS and reviewing any privacy/terms if available, and (4) preferring skills from known authors or with published source/homepages. If you need stronger guarantees, request the maintainer or a homepage and an explicit privacy policy before using with sensitive user data.Like a lobster shell, security has layers — review code before you run it.
latestvk979cw7xczn55bz1hst9x969es848d9e
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
