Cold Email Sequence

v1.0.0

Generate personalized cold email sequences with follow-ups. Supports multiple frameworks (AIDA, PAS, BAB), A/B variants, and merge-field personalization. Pai...

0· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (cold email sequences, A/B tests, personalization, deliverability tips) match the included SKILL.md and reference docs. No unrelated credentials, binaries, or capabilities are requested.
Instruction Scope
SKILL.md limits itself to generating email content, frameworks, timing, subject/body variants, and deliverability advice. It does not instruct reading local files, environment variables, or sending data to external endpoints; merge fields are placeholders only.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required env vars, credentials, or config paths and the instructions do not reference secrets. Requested capabilities are proportionate to generating email copy and deliverability guidance.
Persistence & Privilege
always is false and the skill has no install step or config mutation. It does not request persistent system presence or modify other skills/configuration.
Assessment
This skill is an offline/template generator for cold emails and appears internally consistent. Before using in production: (1) review generated copy to avoid deceptive subject lines (e.g., fake 'Re:'), spammy language, or claims you can't substantiate; (2) test sequences on a small seed list and monitor bounces/replies; (3) if you implement sending yourself, ensure SPF/DKIM/DMARC, domain warm-up, unsubscribe handling, and legal compliance (CAN-SPAM, GDPR); (4) be cautious if you later pair this with a prospect-research skill or paste scraped lists — verify consent and data-source legitimacy. No red flags were found in the provided files.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bjfsts0ea422my0ym5x57m184effz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments