SMS Best Practices
v1.0.0Provides SMS compliance, formatting, and delivery best practices for the Sendly API. Covers TCPA compliance, quiet hours, opt-out handling, E.164 phone forma...
⭐ 0· 61·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the SKILL.md content: guidance on formatting, compliance, opt-outs, carrier verification, costs, and common errors for the Sendly API. Nothing requested or declared is unrelated to that purpose.
Instruction Scope
The instructions are limited to best-practice advice and API-level behavior (e.g., opt-out handling, error codes). They do not direct the agent to read files, access environment variables, or transmit unrelated data to external endpoints.
Install Mechanism
No install spec or code is included (instruction-only), so nothing will be written to disk or executed. This is the lowest-risk installation profile.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is appropriate for a documentation/best-practices skill; nothing requests secrets or unrelated credentials.
Persistence & Privilege
always:false and normal model invocation settings are used. The skill does not request persistent system presence or modify other skills or system-wide configs.
Assessment
This skill is a read-only best-practices guide and does not request credentials or install code, so it is safe to inspect and use for guidance. Before you integrate with Sendly in production, verify the referenced sendly.live URLs are genuine, obtain and protect any API keys the real integration requires, confirm billing/credit costs, and ensure your implementation complies with local regulations (TCPA/consumer consent) and privacy requirements. If you plan to implement sends based on this guidance, review the official Sendly documentation and your legal counsel for compliance-related decisions.Like a lobster shell, security has layers — review code before you run it.
latestvk972n0438tvbqsd8z646serbyd8454ev
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
