Growth Hacker

v1.0.0

Drive explosive user growth through rapid experimentation, viral loops, and data-driven tactics.

1· 1.4k·12 current·12 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (growth experimentation, viral loops, channels) match the included markdown files. The skill declares no binaries, env vars, or installs and the content is purely playbooks and templates appropriate for a growth-hacking guide.
Instruction Scope
All runtime instructions are guidance-only; SKILL.md explicitly states the skill does not access analytics/ad/email systems or send data externally. However, the content includes suggestions for tactics (cold outreach, guerrilla PR, creating scarcity) that can be ethically or legally sensitive if implemented badly. The skill itself does not instruct the agent to read local files, env vars, or call external endpoints.
Install Mechanism
No install spec and no code files — lowest-risk instruction-only asset. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requests no credentials, API keys, or config paths. There is no disproportionate credential access relative to the stated purpose.
Persistence & Privilege
always is false and disable-model-invocation is false (normal). The skill does not request persistent presence or system-level changes and does not modify other skills' configs.
Assessment
This skill is an instruction-only growth playbook and appears coherent and self-contained. Before implementing tactics recommended here: (1) do not grant any account credentials to the skill itself — it requires none; (2) review any outreach or viral mechanics for legal/compliance risk (CAN-SPAM, GDPR, platform rules); (3) avoid dark patterns called out as anti-patterns (address-book harvesting, forced sharing); and (4) treat the guidance as strategies you or your team will execute manually or via trusted integrations — add and review any integrations (analytics/ad/email) individually and only give them the minimum permissions needed.

Like a lobster shell, security has layers — review code before you run it.

latestvk973w3qgxkkcw68n09192bnqq581fk0h

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🚀 Clawdis
OSLinux · macOS · Windows

Comments