affiliate-marketing
v1.0.0When the user wants to plan, implement, or optimize affiliate marketing strategy. Also use when the user mentions "affiliate marketing," "affiliate program s...
⭐ 0· 182·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (affiliate marketing strategy for AI/SaaS products) matches the instructions: guidance on commission models, channels, recruitment, setup, and monitoring. There are no unrelated required binaries, env vars, or config paths.
Instruction Scope
The SKILL.md is narrow and marketing-focused. It instructs the agent to read project context files if present (.claude/project-context.md or .cursor/project-context.md) to tailor advice — this is reasonable for contextualized recommendations but means the skill will access those local files if they exist.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. All recommended data is marketing/strategy related and proportional to the purpose.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent privileges or modify other skills or system settings.
Assessment
This skill appears coherent and low-risk: it only contains marketing guidance and asks no credentials or installs. Note it will read .claude/project-context.md or .cursor/project-context.md if those files exist to tailor advice — avoid putting secrets or sensitive credentials in those files. Also remember that, while benign, this skill can be invoked autonomously by the agent (platform default); if you prefer manual control, adjust agent settings. If you want extra assurance, open the project-context files it would read and confirm they contain only non-sensitive product/context information before enabling the skill.Like a lobster shell, security has layers — review code before you run it.
latestvk9786gxac99av35wm9fy2mctjh833rss
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
