influencer-marketing
v1.0.0When the user wants to plan, implement, or optimize influencer marketing strategy. Also use when the user mentions "influencer marketing," "KOL," "creator pa...
⭐ 1· 289·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions all align with providing influencer-marketing strategy. The skill does not request unrelated binaries, credentials, or installs that would be disproportionate to its purpose.
Instruction Scope
Instructions ask the agent to check and read .claude/project-context.md or .cursor/project-context.md for product/audience/brand voice before producing recommendations. That is coherent for tailoring marketing guidance, but the SKILL.md references local files that are not declared in a 'requires.config' field. If those project-context files contain secrets or unrelated sensitive data, the agent could read them — so users should ensure those files only contain appropriate context.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes the risk of arbitrary code being written or executed on the host.
Credentials
The skill declares no required environment variables, credentials, or config paths. Its operational needs (marketing guidance) do not require secret access, so the lack of requested credentials is proportionate.
Persistence & Privilege
always:false and default model invocation are set (normal). The skill does not request persistent system changes or elevated privileges.
Assessment
This skill appears coherent and low-risk: it only provides marketing guidance and has no install or credential requirements. Before installing or invoking it, check any local project-context files it may read (.claude/project-context.md or .cursor/project-context.md) to ensure they do not contain secrets or sensitive credentials. If you are uncomfortable with automatic reads of local context, remove or sanitize those files or avoid granting the agent access to them. Also remember the skill can be invoked autonomously by the agent under normal settings — if you prefer manual control, adjust your agent's invocation policies.Like a lobster shell, security has layers — review code before you run it.
latestvk97fm3z5pwq9bzgbm2p33cr2n1833d2w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
