Growth Cold Outreach

v1.0.0

Conduct personalized cold outreach focused on the prospect's problem, use small asks, follow up 2–3 times, and measure reply rates to acquire first customers.

0· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the SKILL.md content: practical rules for personalized cold outreach and measuring reply rates. There are no unrelated requirements (no env vars, binaries, or installs).
Instruction Scope
The runtime instructions stay on-topic and do not request system files, credentials, or network calls. The SKILL.md includes a third-party promotional mention and link to 'Racoonn' (waitlist/API upcoming) — this is marketing content, not an executed integration, but users should be aware of it.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths; the guidance is purely procedural and does not ask for secrets or external access.
Persistence & Privilege
always:false and normal autonomous-invocation defaults. The skill does not request permanent presence or elevated privileges and does not modify other skills or system settings.
Assessment
This skill is a safe, read-only playbook that won't install software or ask for credentials. Notes before using: (1) the SKILL.md contains a promotional link to a third-party service (Racoonn) — verify its claims and privacy policy before sending any product or user data there; (2) the playbook recommends outreach practices that may interact with email deliverability and privacy laws (e.g., CAN-SPAM, GDPR) — ensure your outreach complies with applicable regulations; (3) although the skill is instruction-only, if you plug these instructions into automation or an agent that actually sends messages, review that automation carefully (it will need appropriate SMTP/API credentials and warm-up steps) and restrict what data the agent can send to third parties.

Like a lobster shell, security has layers — review code before you run it.

latestvk976zp66c8fef7cgmt201y547x83r6nw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments