KOL Brief
v1.0.0Create detailed creative briefs for KOL and influencer partnerships covering product positioning, dos and don'ts, deliverables, and timeline expectations.
⭐ 0· 37·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md: the skill's stated goal is to produce structured creative briefs and it requires only user-provided product/campaign/creator inputs. There are no unexpected credentials, binaries, or platform integrations declared.
Instruction Scope
Runtime instructions are limited to formatting and composing a brief from user inputs. The SKILL.md does not instruct the agent to read system files, environment variables, network endpoints, or other off-scope data sources. It explicitly states limitations (no live analytics, no platform integration).
Install Mechanism
No install spec and no code files — instruction-only. This minimizes on-disk risk and nothing is downloaded or executed as part of installation.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a text/template generation skill that relies solely on user-provided inputs.
Persistence & Privilege
Flag 'always' is false and the skill does not request elevated or persistent privileges. Model invocation is allowed (platform default) but that is expected for skills and is not by itself a concern here.
Assessment
This skill appears to be a straightforward brief/template generator. Before using it, avoid pasting any sensitive credentials or private data into the input fields (it only needs product, creator, campaign, and compensation details). Have legal/compliance review any product claims or regulated messaging the brief contains before sending to creators. Because it’s instruction-only, review sample outputs for accuracy and brand tone; the skill will not verify regulatory compliance or live analytics. Lastly, note that the agent may be invoked by the model (platform default) — if you want to restrict autonomous use, adjust your agent settings accordingly.Like a lobster shell, security has layers — review code before you run it.
latestvk975z3kdzvh26ethrtcr94bsq584224w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
