Seo Content Brief Generator

v1.0.0

SEO content brief generator agent. Produces complete content briefs from a target keyword: search intent classification, content outline, target word count,...

0· 85·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: the agent builds SEO briefs from user-provided keywords, site context, and competitor excerpts. It does not request unrelated credentials, binaries, or services.
Instruction Scope
Instructions ask the agent to create ~/seo-briefs/ and save files (memory.md, briefs/, clusters.md) and to accept user-pasted competitor content or URLs. This is coherent for a brief generator, but it means user-supplied content and site/context details will be persisted locally. The skill relies on the user for SERP signals (no live scraping).
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written by an installer step beyond the workspace files the instructions describe.
Credentials
The skill requests no environment variables, credentials, or config paths. The lack of external credentials aligns with its described offline/interactive design.
Persistence & Privilege
The skill will create and write to a directory in the user's home (~ /seo-briefs/). That level of persistence is reasonable for a content-creation tool, but users should be aware that any sensitive data pasted into prompts will be stored in that workspace.
Assessment
This skill appears internally consistent for generating SEO briefs. Before installing or using it: 1) Review ~/seo-briefs/ after first run and delete any stored data you don't want kept. 2) Do not paste site credentials, private customer data, or proprietary content into prompts — anything you paste may be saved in memory.md or briefs/. 3) Be cautious when pasting competitor articles (copyright risk). 4) If you want to inspect the implementation, review the linked GitHub repository (homepage) to ensure there are no hidden behaviors. 5) Because the skill can run Bash commands (declared allowed-tool), avoid enabling autonomous invocation if you do not want the agent to run shell actions without review.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cm49dk60mva96c2wxhm2zzx839jd3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments