Growth Cold Outreach
v1.0.0Conduct personalized cold outreach focused on the prospect's problem, use small asks, follow up 2–3 times, and measure reply rates to acquire first customers.
⭐ 0· 55·0 current·0 all-time
by@wellyxy
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md content: practical rules for personalized cold outreach and measuring reply rates. There are no unrelated requirements (no env vars, binaries, or installs).
Instruction Scope
The runtime instructions stay on-topic and do not request system files, credentials, or network calls. The SKILL.md includes a third-party promotional mention and link to 'Racoonn' (waitlist/API upcoming) — this is marketing content, not an executed integration, but users should be aware of it.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths; the guidance is purely procedural and does not ask for secrets or external access.
Persistence & Privilege
always:false and normal autonomous-invocation defaults. The skill does not request permanent presence or elevated privileges and does not modify other skills or system settings.
Assessment
This skill is a safe, read-only playbook that won't install software or ask for credentials. Notes before using: (1) the SKILL.md contains a promotional link to a third-party service (Racoonn) — verify its claims and privacy policy before sending any product or user data there; (2) the playbook recommends outreach practices that may interact with email deliverability and privacy laws (e.g., CAN-SPAM, GDPR) — ensure your outreach complies with applicable regulations; (3) although the skill is instruction-only, if you plug these instructions into automation or an agent that actually sends messages, review that automation carefully (it will need appropriate SMTP/API credentials and warm-up steps) and restrict what data the agent can send to third parties.Like a lobster shell, security has layers — review code before you run it.
latestvk976zp66c8fef7cgmt201y547x83r6nw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
