Trusted — Risk Score 0/100
Last scan:18 hr ago Rescan
0 /100
social-content
Social media content creation skill for LinkedIn, Twitter/X, Instagram, TikTok, and Facebook
This is a legitimate social media content creation skill with no executable code, no sensitive file access, and no suspicious behavior.
Skill Namesocial-content
Duration21.3s
Enginepi
Safe to install
No action needed. The skill is safe to use.
ResourceDeclaredInferredStatusEvidence
Filesystem NONE NONE No file reads/writes in skill; documentation references are informational only
Network NONE NONE No network calls; external tool references (Exa, Apify) are documented prompts r…
Shell NONE NONE No shell commands, scripts, or subprocess usage in any file
Environment NONE NONE No environment variable access in any file
Skill Invoke NONE NONE No cross-skill invocation patterns detected
Clipboard NONE NONE No clipboard access
Browser NONE NONE No browser automation
Database NONE NONE No database access

File Tree

5 files · 28.5 KB · 924 lines
Markdown 4f · 832L JSON 1f · 92L
├─ 📁 evals
│ └─ 📋 evals.json JSON 92L · 6.3 KB
├─ 📁 references
│ ├─ 📝 platforms.md Markdown 170L · 4.3 KB
│ ├─ 📝 post-templates.md Markdown 177L · 3.6 KB
│ └─ 📝 reverse-engineering.md Markdown 195L · 5.4 KB
└─ 📝 SKILL.md Markdown 290L · 8.9 KB

Security Positives

✓ No executable code — all files are documentation (Markdown and JSON)
✓ No scripts, subprocess, or shell commands anywhere in the skill
✓ No sensitive file paths accessed (~/.ssh, ~/.aws, .env, etc.)
✓ No credential harvesting or environment variable iteration
✓ No obfuscated code (base64, eval, atob patterns)
✓ No data exfiltration or C2 communication
✓ No supply chain risk — no dependencies, no package files
✓ Documentation accurately describes the skill's purpose (social media content creation)
✓ Referenced external tools (Exa, Apify, Phantom Buster) are legitimate third-party services requiring user-provided credentials
✓ Reference files provide genuine social media strategy guidance with no hidden functionality
✓ The 'node tools/clis/exa.js' shell invocation in reverse-engineering.md is a documented example only — no actual tool exists in the package