Lynk Manager

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill's requirements, instructions, and included script are consistent with its stated purpose of editing lynk.id pages; it automates in-browser edits or calls an optional local CLI and does not request unrelated credentials, but it will perform live page changes so exercise caution.

This skill appears to do what it says: it runs JS in your browser to find/edit lynk.id blocks and includes a small Python helper that calls a local 'opencli' CLI if present. Before using it: (1) ensure you are logged into the correct lynk.id admin account and have a backup or test page, because the scripts will change live content; (2) review and update the MAPPING in scripts/lynk_update_copy.py so real block IDs are correct (placeholders are present); (3) run any actions first in a safe/test environment or with a dry-run to confirm the right block is targeted; (4) be aware the skill expects to manipulate browser tabs (profile 'openclaw' and a targetId are suggested) and will execute the provided JS in-page—only run that JS on pages you trust; (5) if you rely on the opencli path, confirm the opencli binary is the official tool you expect. There are no unrelated credential requests or hidden network endpoints, but the main operational risk is accidental modification of live content.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.