Shopify Tracking Auditor
v1.0.0Audit Shopify tracking across UTM, pixel, CAPI, and checkout events to identify attribution leaks causing inconsistent ROAS and conversion data.
⭐ 0· 422·1 current·1 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md workflow: mapping funnel events, validating event naming/deduplication, identifying drop-off points, and producing a fix plan. No unrelated capabilities, binaries, or credentials are requested.
Instruction Scope
Runtime instructions are limited to analysis tasks (map events, validate naming/timestamps, produce evidence and a plan). The skill does not instruct the agent to read system files, access external endpoints, or exfiltrate data. It does rely on user-provided event samples and config notes, which is appropriate.
Install Mechanism
No install spec or code files beyond documentation; nothing is downloaded or written to disk. This is the lowest-risk install profile.
Credentials
No environment variables, credentials, or config paths are required. The requested inputs (event samples, pixel/CAPI config, UTM examples) are proportionate to the auditing task.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent or elevated privileges or modify other skills or system settings.
Assessment
This skill is instruction-only and appears coherent for auditing Shopify tracking. It does not request credentials or install software, but be cautious about the data you paste: event logs and analytics samples can contain PII or sensitive identifiers—redact or anonymize before sharing. If you plan to use findings operationally or commercially, confirm license terms (CC BY-NC-SA restricts commercial use) and, if the agent is allowed to call other skills or services, ensure those integrations are authorized and necessary. If future versions add network calls, credential requirements, or install steps, re-evaluate before use.Like a lobster shell, security has layers — review code before you run it.
latestvk974qm5xh6hrx6tshxpee53hnh82qz77
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
