YC Cold Outreach
v1.0.1Expert in Y Combinator (YC) cold email outreach techniques based on Startup School principles. Use to draft, critique, or iterate on cold emails to potential customers, partners, or investors. Based on Aaron Epstein's methodology for high-conversion outreach.
⭐ 8· 3k·1 current·1 all-time
byMark Pors 🦖@pors
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (YC cold outreach) matches the provided SKILL.md and reference material. There are no unexpected binaries, environment variables, or install steps requested that would be unrelated to drafting and critiquing cold emails.
Instruction Scope
Instructions are limited to drafting, critiquing, and following the seven YC principles from the included reference file. The doc encourages deep personalization and research ("Uncommon Commonality", "Personalize: Deep personalization"), which could lead an agent or user to gather external public information about targets; the skill itself does not instruct the agent to read system files, access environment variables, or transmit data to external endpoints.
Install Mechanism
No install spec or code files; this is instruction-only so nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. Requested access is proportional (none) to the stated functionality.
Persistence & Privilege
always is false and the skill does not request elevated or persistent system privileges. Autonomous invocation is allowed (platform default) but not combined with other concerning privileges.
Assessment
This is an instruction-only coaching tool and appears internally consistent. Before using: (1) be careful what private data you paste into the agent—do not share sensitive personal or account credentials; (2) personalization guidance may tempt you to gather public information about targets—avoid unlawful scraping or sharing private contact data without consent; (3) if you later combine this skill with automation (sending emails at scale) ensure you comply with anti-spam laws and any platform-specific rules. If you expect the agent to perform web lookups or contact-sending actions, review those added capabilities separately since they are outside this skill's current scope.Like a lobster shell, security has layers — review code before you run it.
latestvk97a6dc6cavgsmqkz1sd58fqkh80dxnq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
