Newsletter Growth Hacker Pro

v1.0.1

Newsletter 增长黑客工具。提供订阅者获取策略、内容优化、A/B 测试主题行生成、数据分析和增长预测。 Use when: 需要增长 Newsletter 订阅者、优化邮件内容、设计 A/B 测试、分析邮件营销数据、追踪增长趋势

0· 81·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (newsletter growth, content optimization, A/B testing, analytics) matches the included files and examples. The code modules (subscriber acquisition, content optimizer, analytics, main) implement the documented features and there are no unexpected binaries or cloud credentials requested.
Instruction Scope
SKILL.md instructs running the local Python scripts and shows examples of reading exported CSVs and pasting content. The runtime instructions focus on local analysis and do not direct the agent to read unrelated system files, harvest environment variables, or transmit data to third‑party endpoints. Examples that mention ESP exports are reasonable for the stated purpose.
Install Mechanism
There is no install spec; this is an instruction/package with source files. All Python code uses the standard library in the visible files and requirements.txt contains only commented optional dependencies. No downloads, archives, or external installers are referenced.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. The code shown does not access environment variables or secret stores. This is proportional for a local analysis tool.
Persistence & Privilege
Flags show always:false and normal user-invocable/autonomous invocation defaults. The skill does not request persistent system-level privileges or modify other skills' configs in the provided materials.
Assessment
This package appears coherent and safe for local use: it runs Python scripts that analyze text and numeric campaign data and does not request secrets or perform network calls in the provided files. Before installing or running: 1) review the omitted/truncated portions (subscriber_acquisition and any remaining files) to ensure there are no hidden network sends or credential usages; 2) if you plan to connect it to an ESP or automate imports, expect those integrations to require API keys—verify where and how you supply them; 3) treat any subscriber data (emails, names) as sensitive—run the tool in a secure environment and avoid pasting production PII into unfamiliar tooling; 4) if you will publish or deploy this tool, run it in a sandbox first and consider adding unit tests and input validation for robustness.

Like a lobster shell, security has layers — review code before you run it.

growthvk97emyj3p6jnvrq78q8perhgss83cvjglatestvk97emyj3p6jnvrq78q8perhgss83cvjgmarketingvk97emyj3p6jnvrq78q8perhgss83cvjgnewslettervk97emyj3p6jnvrq78q8perhgss83cvjg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments