Lynk Manager
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill's requirements, instructions, and included script are consistent with its stated purpose of editing lynk.id pages; it automates in-browser edits or calls an optional local CLI and does not request unrelated credentials, but it will perform live page changes so exercise caution.
This skill appears to do what it says: it runs JS in your browser to find/edit lynk.id blocks and includes a small Python helper that calls a local 'opencli' CLI if present. Before using it: (1) ensure you are logged into the correct lynk.id admin account and have a backup or test page, because the scripts will change live content; (2) review and update the MAPPING in scripts/lynk_update_copy.py so real block IDs are correct (placeholders are present); (3) run any actions first in a safe/test environment or with a dry-run to confirm the right block is targeted; (4) be aware the skill expects to manipulate browser tabs (profile 'openclaw' and a targetId are suggested) and will execute the provided JS in-page—only run that JS on pages you trust; (5) if you rely on the opencli path, confirm the opencli binary is the official tool you expect. There are no unrelated credential requests or hidden network endpoints, but the main operational risk is accidental modification of live content.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
No visible risk-analysis findings were reported for this release.
