Press Release

v2.0.0

新闻稿生成器。企业新闻稿、产品发布、融资公告、活动报道。Press release generator for product launches, funding announcements, events. 新闻稿、公关稿、媒体发布。Use when writing press releases.

0· 363·3 current·3 all-time
bybytesagain4@xueyetianya
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the delivered functionality: templates and CLI utilities for press releases. The provided scripts generate press‑release text and provide simple local data management which is reasonable for a CLI tool of this type.
Instruction Scope
SKILL.md and the shipped scripts only instruct local CLI usage and text generation. There are no instructions to read unrelated system files, harvest environment variables, or send data to external endpoints.
Install Mechanism
No install spec is provided (instruction-only). The repository includes two small shell scripts (one embeds Python) with no downloads or archive extraction. No external installers or package downloads are used.
Credentials
No required environment variables or credentials are declared. The scripts accept an optional PRESS_RELEASE_DIR to change storage location (default: $XDG_DATA_HOME or $HOME/.local/share/press-release) — this is proportional to the tool's local storage needs.
Persistence & Privilege
The tool creates a local data directory and writes files (data.log, history.log, and potentially config.json) under $PRESS_RELEASE_DIR (default $HOME/.local/share/press-release). This is expected for a CLI utility but it does persist data to disk; consider the storage location if you share the account or run in sensitive environments.
Assessment
This skill appears to be what it claims: a small CLI press‑release generator. Before installing/running, note that it will create a data directory (default ~/.local/share/press-release) containing data.log and history.log — change PRESS_RELEASE_DIR if you prefer another location. The scripts contain readable code (bash + embedded Python), do not perform network calls or request credentials, and are not obfuscated. If you want extra caution, review the two script files locally and run them in a sandbox or throwaway account first. If you need assurance about origin, verify the homepage/source (bytesagain.com / the referenced GitHub URL) before using in production.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e20e282n459fakvfxvt1w2x832q9wproductivityvk97dvkp0ppc4rx2010ehwt6vfx82r89x

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments