Lead Gen Seller
v1.0.0Find B2B leads and write outreach messages for manufacturing/OEM agents. Targets indie beauty brands, skincare companies, and consumer product brands that ne...
⭐ 0· 56·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (B2B lead gen for manufacturing/OEM brands) aligns with the SKILL.md: it instructs web searches, building lead lists, and generating outreach templates. There are no unexpected binaries, cloud credentials, or unrelated capabilities requested.
Instruction Scope
Instructions are limited to public web search, checking websites/Instagram/KS/Indiegogo, collecting publicly-observable fields (brand, website, founder, product), and producing email templates. The skill does not instruct reading local files, environment variables, or transmitting data to third-party endpoints outside normal outreach channels.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. Nothing is written to disk or downloaded, which minimizes installation risk.
Credentials
The skill declares no environment variables, no credentials, and no config paths. The runtime note that it needs a web-search/web-fetch tool is a functional requirement, not a secret. No disproportionate credential access is requested.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges. It does not modify other skills or system settings.
Assessment
This skill appears coherent and limited to public web research and email drafting. Before enabling it, confirm the agent has legitimate web-search and web-fetch tools enabled and that you are comfortable with automated scraping of public pages. Be mindful of privacy and legal limits: avoid scraping or contacting people behind logins, respect site robots.txt and terms, follow anti-spam laws (CAN-SPAM, GDPR opt-out rules), and avoid collecting sensitive personal data. If you plan to use this at scale, validate outreach templates and throttling to avoid abusive behavior. If you see a later version that adds installs, env vars, or download steps, re-check for unexpected credential or network access.Like a lobster shell, security has layers — review code before you run it.
latestvk979nxwxzzs2yqhea0fqqwxqgn83psmb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
