Clickbait Engine
v1.0.0Generate provocative, engaging titles, hooks, and captions that maximize click-through for social media, YouTube, and tweets using proven clickbait strategies.
⭐ 0· 482·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md instructions: the file contains patterns, formulas, and examples for producing clickbait titles and hooks. The skill requests no binaries, env vars, or config paths that would be unrelated to generating copy.
Instruction Scope
Instructions stay within copy-generation (templates, examples, behavioral tactics). They do not instruct reading files, accessing environment variables, or calling external endpoints. Note: the guidance explicitly encourages provocative and potentially misleading framing (name-dropping, 'reveals', strong assertions), which is an ethical/content risk (misinformation/defamation) but not a technical scope violation.
Install Mechanism
No install spec and no code files — nothing will be downloaded or written to disk during install. This is the lowest-risk installation profile from a technical perspective.
Credentials
The skill declares no required environment variables, credentials, or config paths, and the SKILL.md does not reference any secret or external credentials. Requested privileges are proportional (none) to the stated purpose.
Persistence & Privilege
Flags show always:false and default autonomous invocation allowed. That default is normal; the skill does not request permanent presence or elevated system privileges and does not modify other skills or system configs.
Assessment
Technically this skill is coherent and safe to install (it doesn't access your system or secrets). Before using it, consider content risks: it encourages sensational, name-dropping, and potentially misleading claims that could harm reputations or violate platform rules. Review and edit outputs before publishing, avoid repeating unverified or defamatory assertions, and follow publisher/platform policies and legal guidance on misinformation/defamation. If you need a version constrained to fact-checked or neutral language, request or build a variant that enforces verification and avoids named allegations.Like a lobster shell, security has layers — review code before you run it.
latestvk973q8dqrzprq80wpynfdgm16181sb6b
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
