Outreach
v1.0.0Plan, personalize, and track outreach campaigns for sales, PR, recruiting, partnerships, and link building with timing strategy and follow-up cadence.
⭐ 6· 1.4k·4 current·5 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (plan, personalize, track outreach) match the content of the SKILL.md and supporting files. Recommended third‑party tools (Apollo, HubSpot, Pitchbox, etc.) are referenced as examples only — the skill does not request their credentials or claim it will access them.
Instruction Scope
SKILL.md and included docs are limited to guidance for writing messages, timing, follow-up cadence, templates, and tracking practices. The instructions do not tell the agent to read local files, environment variables, system config, or to contact any hidden external endpoints.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written to disk by an installer, so install-risk is minimal.
Credentials
No required environment variables, credentials, or config paths are declared. The skill suggests external tools as part of workflow but does not request keys/tokens or access to unrelated services.
Persistence & Privilege
always is false and there are no install hooks or self-enabling behaviors. The skill does not request persistent presence or modify other skills/configuration.
Assessment
This is a content-and-process guide for outreach (templates, cadence, tracking). It does not request credentials or install code, so technical risk is low. Practical cautions: (1) When you implement these tactics, ensure any contact lists or tracking spreadsheets comply with privacy laws (GDPR, CAN-SPAM) and your organization’s policies; (2) if you later connect this guidance to an email-sending tool or CRM, only provide credentials to trusted services and check what automation the connected tool will perform; (3) review templates for accuracy before sending to avoid mis-personalization or reputational harm.Like a lobster shell, security has layers — review code before you run it.
latestvk971k0mxvnsx5d4xqvcq5s0krn811e20
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
