Content Spy
v1.0.0Document and analyze competitor posting schedules, content themes, hook styles, and promotional timing to spot gaps and counter-programming opportunities.
⭐ 0· 35·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the actual behavior: the skill asks for competitor handles and content samples and produces a structured competitive-audit report. It does not require external credentials or platform access, which is proportionate for an analysis-by-inputs tool.
Instruction Scope
SKILL.md confines the agent to analyzing user-provided data and explicitly states it does not crawl or call platform APIs. The instructions do not ask the agent to read system files, environment variables, or fetch data from unknown endpoints.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is written to disk and there is no third-party package download risk.
Credentials
The skill requires no environment variables, credentials, or config paths. That matches the stated limitation that analysis is performed only on content the user supplies.
Persistence & Privilege
always is false and the skill can be invoked by the agent (the platform default). This is expected for a user-invocable skill; there are no additional persistent privileges or settings modifications requested.
Assessment
This skill is instruction-only and only analyzes data you provide. Before using it: (1) avoid pasting any sensitive credentials, private analytics exports, or proprietary documents you don't want an external system to see; (2) ensure you have the right to reuse or share the competitor content you submit (respect platform TOS and privacy rules); (3) understand the output is inference-based (no live engagement metrics) and should be validated against your own analytics before acting; (4) if you want automated live monitoring of competitors you will need a different tool that uses authorized APIs and appropriate credentials.Like a lobster shell, security has layers — review code before you run it.
latestvk97f6krfwbjsq8p9a7sx6azczn847h39
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
