Followers
v2.0.1Track follower growth, detect unfollows, and analyze engagement trends. Use when monitoring counts, spotting changes, or reviewing audience demographics.
⭐ 0· 196·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (follower tracking, unfollow detection, engagement) matches the shipped script: a local CLI that records entries, produces stats, and exports JSON/CSV/TXT. There are no unexpected credentials, cloud SDKs, or unrelated binaries required.
Instruction Scope
SKILL.md and the script both state and implement local behavior. All referenced paths are under the user's home (~/.local/share/followers). The script reads/writes only those files and uses common utilities (grep, wc, du, tail, head). It does not read other system configs or environment variables, nor does it send data to external endpoints.
Install Mechanism
No install spec; the skill is instruction+script-only. Nothing is downloaded or extracted during install, so there's no high-risk install mechanism.
Credentials
The skill declares no required environment variables or credentials and the script does not access secrets. Requested resources (local filesystem under HOME) are proportional to a local tracking tool.
Persistence & Privilege
always is false and the skill does not modify other skill configs or system-wide settings. It persists only its own data under ~/.local/share/followers, which is expected for this tool.
Assessment
This skill appears to be a simple local CLI that keeps logs and exports under ~/.local/share/followers. Before installing, note: (1) it creates and writes files in your home directory—inspect or back up that directory if you need privacy; (2) despite commands named webhook/notify/automate, the script only logs entries locally and does not perform network calls—if you expect external integrations, review/extend the script carefully; (3) consider file permissions for the data directory and delete it if you later uninstall. Overall the files are coherent with the stated purpose and do not request credentials or network access.Like a lobster shell, security has layers — review code before you run it.
latestvk974fcbb6878v48tzdsasmmkn9834vdm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
