article-content
v1.1.0When the user wants to write, generate, or create article body content—blog post body, long-form content, how-to guide, listicle. Also use when the user ment...
⭐ 0· 149·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (article body / long-form content) match the SKILL.md instructions, which focus on introductions, body sections, conclusions, frameworks, word-count guidance, and content-density advice. No unrelated capabilities, env vars, or binaries are requested.
Instruction Scope
Instructions remain within the scope of writing article body content (structure, hooks, QAE pattern, TL;DR, etc.). The skill recommends actions like auditing the SERP and using proprietary data or competitor articles; those require either user-supplied materials or separate browsing/analysis tools, but the skill itself does not request system access or credentials. Users should be aware it may prompt them for external inputs (competitor content, proprietary data) which could contain sensitive information.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing will be written to disk or fetched during install. This is the lowest-risk install profile.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no disproportionate credential requests.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request permanent presence or modify other skills or system-wide settings.
Assessment
This skill appears coherent and safe from a privileges standpoint: it only provides writing guidance and asks for no credentials or installs. Before using, consider: (1) do not paste proprietary or confidential data into the prompt unless you intend to share it with the model; (2) if the skill asks you to provide competitor articles or proprietary data, ensure you have the right to share that content; (3) verify factual claims and SEO/word-count guidance against up-to-date sources—SEO recommendations change frequently; (4) watch for unverified statistics or claims in generated output and request citations when needed. If you plan to let an agent with browsing or file-access tools follow the skill's SERP-audit advice, confirm those tools' permissions and network access are acceptable.Like a lobster shell, security has layers — review code before you run it.
latestvk97d8x688c99x01d5snb3yqv4d83x1sd
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
