Testimonial Builder
v1.1.0Build a systematic process for collecting, vetting, and using customer testimonials across product pages, ads, and creator briefs.
⭐ 0· 56·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and all included files describe marketing processes (collection, scoring, formatting, placement). No binaries, env vars, or unrelated dependencies are requested — the requested capabilities align with the stated testimonial-building purpose.
Instruction Scope
SKILL.md and supporting docs comprehensively instruct verifying purchases, checking account history, inspecting IPs, and collecting media; these actions are appropriate for testimonial vetting but implicitly assume access to internal systems and customer data (order records, account info, IP logs). The skill does not itself provide connector code or declare required credentials, so implementers must supply secure, authorized access when operationalizing these steps.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written to disk by the skill itself, so there is no install-time risk surface.
Credentials
The skill requests no environment variables or credentials, which is proportional. However, the workflow requires handling PII and internal purchase verification in practice; those are reasonable for the stated purpose but will require appropriate access controls and legal/consent handling in your environment.
Persistence & Privilege
always:false and default autonomous invocation settings are used. The skill does not request persistent presence or system-wide configuration changes. If you allow an agent to invoke this skill autonomously, ensure it has only the minimal authorized access to customer databases and media storage.
Assessment
This skill is a coherent, instruction-only playbook for testimonial programs and appears internally consistent. Before using it in an automated agent or operationalizing its steps, confirm: (1) you have explicit customer consent and documented usage rights for any published testimonials; (2) systems used to 'verify purchase history' or check IPs are accessed securely and with least privilege; (3) incentive disclosures and legal review processes are implemented to avoid regulatory risk; (4) any PII or media files are stored and retained according to your privacy policy and applicable laws (GDPR/CCPA/etc.); and (5) if an agent will act autonomously on these instructions, restrict its credentials and scope so it cannot exfiltrate customer data or perform unintended actions. If you want, I can point out exact lines that reference internal systems (order IDs, IP checks, purchase verification) so you can assess required permissions.Like a lobster shell, security has layers — review code before you run it.
latestvk97ds4ntwej0q182a1jcjen2gs84q8w9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
