Whop

v1.0.1

Run and grow a Whop business with better offers, checkout flows, promo strategy, affiliates, ads, tracking, analytics, support operations, and advanced API w...

1· 110·0 current·0 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description map directly to the provided guidance files (offers, growth, API workflows, webhooks, proxy/dev guidance). Optional env vars and the declared config path (~/whop/) are appropriate for a Whop-focused assistant.
Instruction Scope
SKILL.md and the included docs stick to Whop business and technical workflows (dashboard-first guidance, when to use APIs/webhooks, proxy usage, sandbox-first testing). They do instruct storing memory under ~/whop/ and using env vars for secrets, but explicitly warn to keep secrets out of memory and to verify webhook deliveries.
Install Mechanism
No install spec and no code files — the skill is instruction-only. The only optional third-party package referenced is an official dev proxy package (documented as @whop-apps/dev-proxy), which is reasonable and optional.
Credentials
No required environment variables; the optional vars (WHOP_API_KEY, WHOP_WEBHOOK_SECRET, WHOP_COMPANY_ID, WHOP_USER_ID, WHOP_RESOURCE_ID) are directly relevant to the documented API/webhook use cases. The skill warns to store secrets in env vars rather than memory.
Persistence & Privilege
always is false and the skill is user-invocable; it only requests a local config path (~/whop/) for storing notes/memory which matches the documentation. It does not request elevated platform privileges or modify other skills.
Assessment
This skill is documentation-only and internally consistent with running a Whop business. Before enabling it: (1) treat WHOP_API_KEY and WHOP_WEBHOOK_SECRET as sensitive — keep them in your secret manager or env vars, not in ~/whop/memory.md; (2) use sandbox keys and separate sandbox vs production notes when testing; (3) if you install the optional dev-proxy, install from the official package registry (verify package name/author) and prefer standalone usage for safety; (4) limit API key scopes to the minimum needed (read-only when possible) and rotate/regenerate keys if you ever paste them into a shared file; (5) review the ~/whop/ files the first time the skill creates them so no secrets are stored in plaintext. These steps will reduce risk while keeping the skill useful.

Like a lobster shell, security has layers — review code before you run it.

latestvk975er22yaek3k9h6ew8gs8g1n83051a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🟠 Clawdis
OSLinux · macOS · Windows
Config~/whop/

SKILL.md

When to Use

User is working on Whop in any serious business sense: shaping an offer, pricing a product, creating checkout links, launching promo codes, setting up affiliates, testing ads and tracking, improving conversion, handling member operations, or using the API when the dashboard is not enough.

Architecture

Memory lives in ~/whop/. If ~/whop/ does not exist, run setup.md. See memory-template.md for structure.

~/whop/
├── memory.md       # Current business model, priorities, and blockers
├── offers.md       # Products, pricing, trials, waitlists, and checkout notes
├── growth.md       # Promo codes, affiliates, ads, tracking, and channel notes
├── ops.md          # Support, refunds, disputes, retention, and analytics habits
└── tech.md         # API keys, webhooks, app IDs, permissions, and automation notes

Quick Start

Start with the highest-value layer first:

  • Offer: what is being sold, to whom, with what pricing, trial, and checkout path
  • Growth: which channels drive traffic, which affiliates matter, and how attribution is tracked
  • Operations: how members are onboarded, supported, retained, refunded, and analyzed
  • Automation: only use API, webhooks, or local app tooling when the native business workflow is too slow or too manual

Quick Reference

Load the smallest file that matches the current Whop surface instead of reading everything at once.

TopicFile
Setup guidesetup.md
Memory templatememory-template.md
Offers, pricing, trials, waitlists, and checkout linksoffers-and-checkouts.md
Promo codes, affiliates, ads, and attributiongrowth-and-marketing.md
Analytics, users, refunds, disputes, and support operationsoperations-and-retention.md
Auth, access checks, and permissions for advanced workauth-permissions.md
Advanced API automation, stats, and programmatic workflowsapi-workflows.md
Local app development with the proxyproxy-and-local-dev.md
Webhooks, sandbox, and go-live checkswebhooks-and-sandbox.md

Requirements

  • No API key is required for dashboard-only guidance around offers, affiliates, analytics, or operations
  • WHOP_API_KEY is optional for advanced REST calls, stats queries, file creation, webhook management, promo-code automation, or access token creation
  • WHOP_WEBHOOK_SECRET is optional for verifying webhook deliveries
  • Optional local proxy CLI: @whop-apps/dev-proxy exposes whop-proxy
  • Optional official packages: @whop/sdk, @whop/embedded-components-react-js, @whop/embedded-components-vanilla-js, whop-sdk, whop_sdk

Core Rules

1. Start from the business goal, not the API surface

  • Decide first whether the user is trying to sell more, launch faster, improve conversion, retain members, or automate a repetitive workflow.
  • Default to the native Whop dashboard flow when it already solves the problem cleanly.
  • Reach for API, webhooks, or local app tooling only when the user needs scale, repeatability, or custom behavior.

2. Optimize the offer before optimizing acquisition

  • Use products, pricing, free trials, waitlists, and checkout links to sharpen the core offer first.
  • Whop supports free checkout links, one-time payment links, recurring links, and split-payment checkout links in the dashboard.
  • Use waitlists when qualification matters more than raw volume.

3. Keep attribution clean across every channel

  • Use tracking links to compare email, X, Instagram, YouTube, communities, and paid traffic sources.
  • Add external tracking integrations before scaling spend so the business can see more than dashboard-native numbers.
  • Keep affiliate, ad, and direct traffic paths separate in notes so conversion decisions stay defensible.

4. Use the right growth lever for the right traffic source

  • Promo codes are for controlled price incentives at checkout.
  • Global affiliates expose the business to Whop's affiliate network with a default 30% commission.
  • Custom affiliates and rev share are better for closers, creators, partners, and negotiated deals.
  • Whop Ads exists as a native paid-growth surface, but the docs currently describe it as a beta product with limited access.

5. Read operations and retention as part of the funnel

  • Analytics, support chats, user management, refunds, disputes, and payment operations are not back-office trivia; they change retention and reputation.
  • When a business problem appears, line up acquisition source, product, checkout path, payment outcome, and member lifecycle before changing strategy.
  • Use built-in analytics first, then Whop stats or webhooks if the dashboard view is not enough.

6. Treat advanced automation as a separate trust boundary

  • Server-to-server work uses Authorization: Bearer ... against https://api.whop.com/api/v1.
  • Embedded app requests inside a Whop iframe identify the current user through x-whop-user-token.
  • Embedded components use short-lived access tokens, not raw iframe headers or long-lived API keys in the browser.
  • Webhooks must be verified before side effects, and sandbox and production assets must stay fully separate.

7. Keep Whop IDs and environments explicit

  • Preserve Whop prefixes such as biz_, app_, prod_, plan_, user_, hook_, and file_.
  • Record whether a fact came from dashboard work, sandbox testing, or production automation.
  • Handle 403s, access failures, and weird data mismatches as scope or approval problems before blaming payloads.

Whop Traps

These are the failure modes that waste the most time in real Whop businesses.

TrapConsequenceBetter Move
Scaling traffic before the offer is clearYou buy clicks into a weak checkout or confusing productTighten product, pricing, trial, and checkout path before increasing spend
Mixing promo codes, affiliates, and direct traffic in one bucketAttribution gets muddy and decisions become guessworkKeep one tracking path per channel and compare them cleanly
Using global affiliates when you really need negotiated partner termsMargin and incentives drift out of controlUse custom affiliates or rev share for strategic partners
Treating analytics as a last stepProblems are discovered only after revenue dropsReview user, payment, and support signals as part of weekly operations
Testing payment or webhook automation directly in productionReal money movement and noisy customer dataStart in sandbox with separate keys, webhooks, and test cards
Using a company API key where iframe user context is requiredWrong user identity or missing entitlementsDecide first between bearer auth, x-whop-user-token, and short-lived access tokens

External Endpoints

Every network touchpoint should map to one of these declared Whop surfaces.

EndpointData SentPurpose
https://api.whop.com/api/v1/*Bearer token, query params, JSON bodies, resource IDsREST API for companies, products, plans, payments, promo codes, leads, checkout configurations, webhooks, files, access tokens, and stats
https://sandbox.whop.com/*Sandbox keys, test payment data, webhook configuration, install actionsSafe pre-production testing environment
https://docs.whop.com/*No runtime secrets requiredOfficial docs for auth, permissions, proxy, sandbox, and webhook behavior
https://whop.com/apps/*/installApp and company selection in browserInstall and re-approve app permissions

No other data is sent externally.

Security & Privacy

Data that leaves your machine:

  • Bearer credentials sent to Whop for authenticated API requests
  • Business metadata, growth settings, membership data, payment filters, promo-code changes, and stats queries sent to Whop
  • Webhook acknowledgements returned from your app back to Whop

Data that stays local:

  • Offer, growth, operations, and environment notes stored in ~/whop/
  • Local proxy configuration and development URLs
  • Secret values kept in environment variables rather than in project files

This skill does NOT:

  • Store secret literals in repository files
  • Skip token or webhook verification
  • Push the user into API work when the dashboard path is better
  • Assume sandbox parity for apps, messaging, or payouts
  • Make undeclared requests outside Whop

Trust

By using this skill, data is sent to Whop. Only install if you trust Whop with customer, growth, payout, membership, and business metadata.

Related Skills

Install with clawhub install <slug> if user confirms:

  • ads — Paid acquisition strategy, testing discipline, and media-buying tradeoffs
  • api — General REST API patterns, auth strategies, and HTTP debugging
  • oauth — OAuth token lifecycles, redirects, and delegated access flows
  • payments — Payment system patterns, failure handling, and reconciliation habits
  • webhook — Webhook verification, replay handling, and delivery design

Feedback

  • If useful: clawhub star whop
  • Stay updated: clawhub sync

Files

10 total
Select a file
Select a file to preview.

Comments

Loading comments…