Rank Tracker
v9.0.1Track keyword rankings and SERP feature changes in traditional search and AI responses over time. 排名追踪/SERP监控
⭐ 1· 2.3k·9 current·9 all-time
byAaron Zhu@aaron-he-zhu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (rank tracking, SERP/GEO visibility) matches the SKILL.md content and templates. The skill does not request unrelated credentials, binaries, or system access.
Instruction Scope
Runtime instructions and templates focus on keyword tracking, reporting, alerts, and memory handoffs. It references repository docs (CLAUDE.md, state model) and writing monitoring summaries to agent memory, which is appropriate for a monitoring skill. It does not instruct reading unrelated system files or exfiltrating secrets.
Install Mechanism
No install spec and no code files are included (instruction-only). Nothing will be downloaded or written to disk by an installer.
Credentials
The skill declares no required environment variables or credentials. Optional integrations are noted; any API keys would be supplied by the user for external SEO tools, which is expected for this domain.
Persistence & Privilege
always:false (no forced global inclusion). The skill will write monitoring/handoff summaries into agent memory (memory/monitoring/, memory/open-loops.md, memory/decisions.md) per its contract — this is consistent with its monitoring role but worth noting as persistent state.
Assessment
This skill is instruction-only and appears coherent for rank tracking. Before installing: (1) understand that it will write monitoring summaries into the agent's memory paths (memory/monitoring/, memory/open-loops.md, memory/decisions.md); (2) only provide API keys for optional SEO tool connectors you trust and review the connectors/CONNECTORS.md to see which external endpoints would be used; (3) avoid pasting unrelated secrets into prompts (the skill does not require any by default); and (4) if you enable network access for automated integrations, audit the specific connectors and scopes those integrations request.Like a lobster shell, security has layers — review code before you run it.
keyword-rankingsvk978t1xp9c9rfvq2jttnypbt7n84adgblatestvk976gsqc17f1ftq0ama18912f5850hm5rank-trackingvk978t1xp9c9rfvq2jttnypbt7n84adgbseovk978t1xp9c9rfvq2jttnypbt7n84adgbserp-monitorvk978t1xp9c9rfvq2jttnypbt7n84adgb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
