Ghost Publishing Pro
v2.5.1Headless Ghost publishing. Write, audit, and automate your entire Ghost operation from your AI workflow — 17 workflows covering article publishing, batch imp...
Like a lobster shell, security has layers — review code before you run it.
Ghost Publishing Pro
Before You Install
This skill has three hard requirements:
- Node.js installed locally (
node --versionto verify) - curl installed (
curl --versionto verify — standard on macOS/Linux) - Ghost Admin API key stored at
~/.openclaw/credentials/ghost-admin.json
If those three aren't ready, start with the Credentials Setup section below. Everything else in this skill assumes they're in place.
A full Ghost CMS publishing skill built from real production use — not a generic API wrapper.
This contains proven workflows, hard-won pitfalls, and patterns from actually running a Ghost Pro newsletter and migrating an entire Squarespace blog in an afternoon.
Dependencies
Most workflows use only Node.js built-ins (fs, https, and the standard HMAC module) and curl — no npm packages required.
The Squarespace/WordPress XML migration workflow optionally uses one npm package:
npm install fast-xml-parser
Install this only if you are running a migration script. All other workflows (publish, update, schedule, image upload, analytics) require no third-party packages.
Required Access
This skill uses Ghost's Admin API. Here's exactly what it does with your credentials:
Reads: Post list, member count, analytics, post content, image URLs.
Writes: Creates and updates posts, uploads images, schedules content, sends newsletters.
Recommended setup: Create a dedicated integration key (Settings > Integrations > Add custom integration > Admin API Key). This covers the full publishing workflow with minimal scope.
The skill never stores credentials beyond the file you configure. No external calls outside your Ghost instance.
Security Model
This skill is designed around minimal-scope credential use. Here's exactly how credential access is scoped and why it's safe:
Use a dedicated integration key, not your owner credentials. Ghost Admin → Settings → Integrations → Add custom integration → copy the Admin API Key. This key is isolated to the integration, fully revocable, and scoped to post/image/member operations — your owner account is never exposed.
The credentials file is read-only at runtime. The skill reads ~/.openclaw/credentials/ghost-admin.json to generate a short-lived JWT (5-minute expiry). Nothing is written back to the file. Tokens are captured to shell variables, never logged or persisted.
No external calls outside your Ghost instance. Every API call targets your Ghost domain only. No third-party services, no telemetry, no data leaves your site.
Revocation is instant. If you need to cut access, delete the integration in Ghost Admin → Settings → Integrations. All tokens derived from that key immediately stop working.
Keep the credentials file out of shared folders and version control. Restrict access to your user account only using your OS file permission settings.
What This Skill Won't Do
Ghost's Admin API integration tokens cannot access certain owner-level operations:
- Staff management — owner-only, no API path
- Site settings / code injection — API token returns
403 NoPermissionErrorby design - Redirects and routes files —
GET/POST /ghost/api/admin/redirects/returns403with integration tokens. Must upload via Ghost Admin → Settings → Labs → Beta features → Redirects upload button
Theme management (upload + activation) is fully supported via the Admin API — see Workflow 15 below.
If you hit a NoPermissionError on settings write endpoints, that is expected Ghost behavior — not a bug.
Credentials Setup
Create a credentials file at ~/.openclaw/credentials/ghost-admin.json:
{
"url": "https://your-site.ghost.io",
"key": "id:secret"
}
Stored at: ~/.openclaw/credentials/ghost-admin.json (fields: url, key)
Get your key: Ghost Admin > Settings > Integrations > Add custom integration > Admin API Key.
Covers: all post operations, image uploads, scheduling, newsletters, analytics, batch updates.
Authentication
Ghost uses short-lived JWT tokens. Generate one before every API call — they expire in 5 minutes.
Pure Node.js — no npm required.
Token generation uses Node.js built-ins (fs and the standard HMAC module) and the Admin API key format (id:secret). The full implementation is in references/api.md under Authentication — copy the token generation script into your workflow, capture the output to a shell variable, and pass it as Authorization: Ghost {token} on all requests.
Tokens expire in 5 minutes. Regenerate before each API call or every 50 posts in batch operations.
Core Operations
Publish a post + send as newsletter (one call)
curl -s -X POST "{url}/ghost/api/admin/posts/?source=html" \
-H "Authorization: Ghost {token}" \
-H "Content-Type: application/json" \
-d '{"posts":[{
"title": "Your Title",
"html": "<p>Your content</p>",
"status": "published",
"email_segment": "all"
}]}'
This is the killer feature — one API call publishes to the web and sends to all subscribers simultaneously. Do not publish first and try to send separately. Use Ghost admin to manually resend if you miss this.
Create a draft
Same as above with "status": "draft". No email sent.
Update an existing post
# 1. Fetch post to get updated_at (required)
curl -s "{url}/ghost/api/admin/posts/{id}/" -H "Authorization: Ghost {token}"
# 2. Update with updated_at included
curl -s -X PUT "{url}/ghost/api/admin/posts/{id}/?source=html" \
-H "Authorization: Ghost {token}" \
-H "Content-Type: application/json" \
-d '{"posts":[{"html":"<p>New content</p>","updated_at":"{fetched_updated_at}"}]}'
List posts
curl -s "{url}/ghost/api/admin/posts/?limit=15&filter=status:draft&fields=id,title,slug,status,updated_at" \
-H "Authorization: Ghost {token}"
Upload image
curl -s -X POST "{url}/ghost/api/admin/images/upload/" \
-H "Authorization: Ghost {token}" \
-F "file=@/path/to/image.jpg" \
-F "purpose=image"
# Returns URL — use as feature_image value
Schedule a post
Add "status": "scheduled" and "published_at": "2026-03-20T18:00:00.000Z" (UTC).
HTML Content
Always use ?source=html in the request URL. Ghost accepts raw HTML in the html field.
Standard article: <p>, <h2>, <h3>, <hr>, <blockquote>, <ul>, <ol>
Book-style literary typography — ideal for fiction, essays, and long-form literary content:
<div style="font-family: Georgia, serif; text-align: justify; hyphens: auto; -webkit-hyphens: auto;" lang="en">
<p style="text-indent: 2em; margin-bottom: 0; margin-top: 0;">Paragraph one.</p>
<p style="text-indent: 2em; margin-bottom: 0; margin-top: 0;">Paragraph two — no gap, indent only.</p>
</div>
YouTube embed:
<figure class="kg-card kg-embed-card">
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/{VIDEO_ID}"
frameborder="0" allowfullscreen></iframe>
</figure>
Email rules — critical:
- JS is stripped in email delivery. No scripts or interactive elements.
- Subscribe widgets are web-only — stripped from email.
- Ghost wraps content in its own email template. Don't add headers or footers.
- The
email_segmentfield only fires on first publish. It must be in the same API call as"status": "published".
Migration Workflows
See references/workflows.md for full migration playbooks:
- Squarespace XML export > Ghost batch import (proven — full blog migrated in one afternoon)
- WordPress XML migration
- Substack CSV + HTML migration
- Batch feature image updates
- DOCX > book-style Ghost posts with YouTube embeds
- Native audio card embedding (upload MP3, embed as Ghost audio card)
- Theme management (JWT upload where supported; Ghost Admin fallback)
- Site audit — scan all published posts for missing feature images, excerpts, meta descriptions, tags, stale slugs, and untouched content (Workflow 14)
- Content performance intelligence — three-section report: email performance (open rate, click rate, CTO, divergence analysis), web-only post health + amplification candidates, pages health snapshot. Audience snapshot with subscriber tier breakdown. (Workflow 15)
- Batch excerpt push — write custom excerpts to all posts in a single run. 300-char hard cap, slug-based targeting, skip/fail reporting. Proven on 65 posts in production. (Workflow 16)
- GSC → Ghost indexing & SEO repair loop — triage GSC coverage report, classify unindexed URLs, fix Ghost-specific redirect issues (API blocks redirect writes — Labs upload only), submit real posts for indexing, accelerate discovery with internal links. Proven on josephvoelbel.com post-Squarespace migration. (Workflow 17)
See references/api.md for complete endpoint documentation, error codes, and token generation details.
Common Pitfalls
409 on PUT— must includeupdated_atfrom a fresh fetch- Email not sending —
email_segmentonly fires on first publish; use Ghost admin to resend - Rate limiting — add 500ms delay between calls in batch scripts
- Token expired mid-batch — regenerate every 50 posts in long operations
tagsinfieldsparam causes400 BadRequestError— use&include=tagsinstead- External script tag in code injection pointing to a local/LAN hostname will silently fail on the live HTTPS site — mixed content + Private Network Access policy blocks it. All search/widget JS must be inline in the code injection block.
PUT /admin/settings/always returns403with integration tokens — site settings require owner access in Ghost AdminGET /admin/integrations/also returns403— get Content API key from site HTML source instead (data-key=attribute on portal/search script tags)- Custom theme:
{{content}}must be triple-braced — in any custom.hbstemplate, always use{{{content}}}(three braces). Double-braced{{content}}escapes the HTML and rendersundefinedinstead of the post body. - Custom excerpts drive search — Ghost's Content API
fields=excerptreturns the custom excerpt, not body text. If a post needs to surface in client-side search for a keyword, that keyword must appear in the custom excerpt. - Links inside HTML cards in Lexical are double-escaped — regex on
"url":"..."fields won't find them. Usejson.dumps(lexical)→ string replace →json.loads()to safely find and replace any URL pattern inside embedded HTML. - Ghost's sitemap is always clean — Ghost Pro auto-generates sitemaps using the configured site URL. No manual sitemap editing needed.
- Squarespace migration leaves /blog/ links — batch imports preserve old internal link paths with the
/blog/prefix. After any Squarespace import, audit all posts for/blog/references and fix them via the API. POST /admin/redirects/upload/returns403— redirect rules must be uploaded manually via Ghost Admin → Settings → Labs → Redirects upload button. The API endpoint is blocked for integration tokens by design.
Tag Management
Ghost's Admin API supports full tag CRUD. These endpoints require an Admin-level token (owner or staff with Admin role). Integration tokens return 403 — if that happens, see the safe-mode note below.
List all tags
r = requests.get(
f'{GHOST_URL}/ghost/api/admin/tags/?limit=all',
headers=headers
)
tags = r.json().get('tags', [])
for tag in tags:
print(tag['id'], tag['name'], tag['slug'])
Create a tag
r = requests.post(
f'{GHOST_URL}/ghost/api/admin/tags/',
headers=headers,
json={"tags": [{"name": "Your Tag", "slug": "your-tag"}]}
)
if r.status_code == 403:
print("Safe-mode: Admin token requires owner-level permissions for tag endpoints. Add tags manually in Ghost Admin or use an owner token.")
else:
tag = r.json()['tags'][0]
print(tag['id'], tag['name'])
Update a tag
# Fetch tag id first via list, then:
r = requests.put(
f'{GHOST_URL}/ghost/api/admin/tags/{TAG_ID}/',
headers=headers,
json={"tags": [{"id": TAG_ID, "name": "Updated Name", "slug": "updated-slug"}]}
)
if r.status_code == 403:
print("Safe-mode: owner-level token required for tag updates.")
Delete a tag
r = requests.delete(
f'{GHOST_URL}/ghost/api/admin/tags/{TAG_ID}/',
headers=headers
)
if r.status_code == 403:
print("Safe-mode: owner-level token required for tag deletion.")
elif r.status_code == 204:
print("Tag deleted.")
Bulk assign a tag to multiple posts
# Fetch posts, then PATCH each with the tag added
posts = requests.get(
f'{GHOST_URL}/ghost/api/admin/posts/?limit=all&include=tags',
headers=headers
).json()['posts']
for post in posts:
existing_tags = [{"id": t["id"]} for t in post.get("tags", [])]
if not any(t["id"] == TAG_ID for t in existing_tags):
existing_tags.append({"id": TAG_ID})
requests.put(
f'{GHOST_URL}/ghost/api/admin/posts/{post["id"]}/',
headers=headers,
json={"posts": [{"id": post["id"], "updated_at": post["updated_at"], "tags": existing_tags}]}
)
print(f"Tagged: {post['title']}")
Safe-mode note: All tag write endpoints (
POST,PUT,DELETE) require owner-level Admin API credentials. If you get a403, either switch to an owner token or manage tags manually in Ghost Admin → Settings → Tags. The list endpoint (GET) works with standard integration tokens.
License
MIT. Copyright (c) 2026 @highnoonoffice. Retain this notice in any distributed version.
Comments
Loading comments...
