Internet Marketing
v1.0.0Creates practical, low-cost marketing strategies for solo entrepreneurs and small businesses launching new ideas, focusing on organic growth, content creatio...
⭐ 2· 2k·11 current·11 all-time
by@xeroc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (internet marketing for solo entrepreneurs) matches the SKILL.md content: frameworks, 90-day plans, discovery call scripts, and tactics. The skill does not request unrelated credentials, binaries, or configuration.
Instruction Scope
Runtime instructions are strategy-focused and stay within marketing advice (discovery questions, content plans, outreach templates). They do mention business actions like 'capture emails' and 'send payment link' which are normal marketing practices — the skill does not include steps to programmatically collect or exfiltrate data, but users should be mindful that executing those tactics in practice involves handling personal data and payment flows which require separate, secure tooling and policies.
Install Mechanism
No install spec and no code files (instruction-only). Nothing is written to disk and no external archives or package installs are referenced.
Credentials
The skill declares no required environment variables, credentials, or config paths. All requested inputs are contextual business questions (value proposition, audience, budget), which is proportional to a strategy-oriented skill.
Persistence & Privilege
always is false and the skill uses default autonomous invocation. That is normal for skills. It does not request permanent system presence or modify other skills/configurations.
Assessment
This is an instruction-only marketing strategist and appears coherent and low-risk: it does not request credentials or install code. Before using, consider: (1) the skill owner/source is unknown — review outputs and templates before acting; (2) the guidance may recommend capturing emails or sending payment links in your business — do not share account credentials, payment API keys, or customer PII with the skill or any third party; (3) if you plan to automate actions (email capture, payments, posting), require explicit human approval and use secure, reviewed integration tooling for those operations; (4) validate any legal/privacy requirements (consent, GDPR, CAN-SPAM) before executing lead-capture recommendations.Like a lobster shell, security has layers — review code before you run it.
latestvk9711qfw1f2zrjz42qvyr7zyq9819zxm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
