Creator Commerce Context
v1.0.0Normalize fragmented creator, product, and campaign details into a structured, reusable context pack for streamlined ecommerce and affiliate workflows.
⭐ 0· 110·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, and SKILL.md consistently describe normalizing ecommerce/creator notes into a context pack. There are no unrelated requirements (no credentials, binaries, or config paths) that would be disproportionate to this purpose.
Instruction Scope
The runtime instructions only ask the agent to extract facts from user-provided messy notes, separate facts vs assumptions, and assemble a structured output. The skill does not instruct the agent to read arbitrary system files, access environment variables, or transmit data to external endpoints.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. That minimizes disk writes and external code execution risk.
Credentials
No environment variables, credentials, or config paths are requested. The absence of secrets/keys is proportionate to the described text-normalization purpose.
Persistence & Privilege
The skill is not force-included (always: false) and uses the default autonomous invocation setting. It does not request elevated persistence or permissions and does not modify other skills or system configuration.
Assessment
This skill appears coherent and low-risk: it only restructures whatever text you give it. Before using, avoid pasting secrets or sensitive personal data into the input (API keys, passwords, unredacted PII). Review the generated context pack for mistaken assumptions the skill marks as 'assumptions' or 'missing information' before handing it to downstream automation. If you intend to pass the output to other skills that can make network calls or perform actions, verify those downstream skills' permissions and credentials separately.Like a lobster shell, security has layers — review code before you run it.
latestvk972nrszdj1mx20jcfjnm1k8gx8328z8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
