Instagram Agent — Complete Operations Playbook

v1.0.0

Comprehensive Instagram growth playbook prioritizing Reels, niche consistency, algorithm-driven posting, SEO keywords, engagement timing, and multi-format co...

2· 445·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill is a content/operations playbook for Instagram growth. It contains only guidance and strategy and does not request binaries, environment variables, or external services that would be unrelated to that purpose.
Instruction Scope
SKILL.md contains tactical posting, caption, and engagement guidance only. It does not instruct the agent to read files, access environment variables, call external endpoints, or perform system operations. Note: some behavioral recommendations (e.g., aggressively engaging around posts) could be risky if later automated by another tool — the document itself does not automate anything.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing will be written to disk or downloaded during installation.
Credentials
No environment variables, credentials, or config paths are required or referenced in the SKILL.md, which is proportionate for a strategy/playbook skill.
Persistence & Privilege
The skill does not request always:true or other elevated persistence, nor does it indicate modifying other skills or system-wide settings.
Assessment
This skill is an instruction-only Instagram strategy guide and does not request credentials or install code, so technical risk from installation is low. Before using the recommendations, consider: (1) verify claims that reference platform features (e.g., 'Trial Reels') against Instagram's official docs—algorithms change frequently; (2) avoid automating the recommended engagement protocols with bots or services that violate Instagram's Terms of Service; (3) be cautious about any subsequent tooling you use to implement these tactics (scheduling/automation services may request credentials); and (4) if you need stronger assurances, ask the publisher for a source or references for metrics cited here.

Like a lobster shell, security has layers — review code before you run it.

contentvk9752wnj2b7xa9ax9xnjjg22zn838yv6growthvk9752wnj2b7xa9ax9xnjjg22zn838yv6instagramvk9752wnj2b7xa9ax9xnjjg22zn838yv6latestvk9752wnj2b7xa9ax9xnjjg22zn838yv6reelsvk9752wnj2b7xa9ax9xnjjg22zn838yv6social-mediavk9752wnj2b7xa9ax9xnjjg22zn838yv6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments