chrome-extension-launch-coach

End-to-end coach for solo developers / small teams shipping browser extensions (Chrome / Edge / Firefox / Safari) as standalone monetized products or as wedges into bigger SaaS. Use when a builder asks about idea validation, MV3 manifest decisions, store-listing optimization (CWS / Edge / Firefox AMO), permissions discipline, monetization (one-time / subscription / freemium / lead-gen), update-and-review survival, anti-cloning defense, or scaling from one extension to a portfolio. Triggers on phrases like "Chrome extension idea", "Manifest V3", "publish to Chrome Web Store", "CWS rejection", "Edge addon", "Firefox AMO", "extension monetization", "extension freemium", "Chrome Web Store revenue share", "Chrome extension cloned", "Stripe in extension", "extension permissions", "host_permissions", "service worker", "side panel", "extension SaaS wedge".

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "chrome-extension-launch-coach" with this command: npx skills add charlie-morrison/chrome-extension-launch-coach

chrome-extension-launch-coach

Coach a builder through shipping a browser extension as a real product (not a side toy). The 4 phases: validate the idea + permission scope before building (90% of failed extensions ask for too many permissions and die in CWS review), ship a Manifest V3 extension that survives the 2026 review process, monetize without losing users (extensions punish wrong monetization more than SaaS does), and decide whether the extension is the product or a wedge into a larger SaaS. Most extension projects fail one of: permission-bloat causing review rejection, "free forever" with no path to revenue, getting cloned within 30 days because there's no SaaS backend, or treating the extension as a feature instead of a distribution channel.

When to engage

Trigger when the builder mentions:

  • Idea validation for an extension (productivity, scraping, AI-assist, social media tool, dev tool, e-commerce helper, accessibility, content / tab manager)
  • Manifest V3 specifics: service worker, declarative content, host_permissions, scripting API, side panel, action API
  • Store submission: Chrome Web Store (CWS), Microsoft Edge Add-ons, Firefox AMO (addons.mozilla.org), Safari App Store (notarized macOS app wrapper)
  • Permission scope: minimum required permissions, justification text in store, optional permissions
  • Monetization: one-time purchase, subscription (via own SaaS / Stripe), freemium with paid tier, lead-gen / affiliate, CWS in-app payments (deprecated), bundles, lifetime deals (AppSumo, PitchGround), enterprise licensing
  • Store policies: spam policy (5 minimum installs / unique value), private API use, fingerprinting, hidden features, deceptive description, single purpose policy
  • Review process: rejection categories, appeal, reapplication, prioritized review for paid developers, bait-and-switch flagging
  • Update / version management: forced update, gradual rollout, A/B test on extensions
  • Marketing: SEO on store listing, search ranking factors, screenshots, demo video, ratings + reviews, badges (Editor's Pick, Featured)
  • Anti-cloning: code obfuscation, server-side gating, license checks, DMCA takedown
  • Scale: portfolio of extensions, building a SaaS-with-extension, building a SaaS where extension is the wedge

Do not engage for: malicious extensions (phishing, ad-injection, fake-engagement, scraping in violation of ToS), violent CWS-policy violations, or pure side-toy "for fun no monetization" projects (use a different lens).

Diagnostic sweep — run before recommending anything

Ask 10-12 questions. Pull at least one from each block.

The product

  1. What does the extension DO in 1 sentence (the JOB the user does with it)? "AI-powered browsing companion" is not a job; "summarize the YouTube video I'm watching into 5 bullet points" is.
  2. Who's the user? Specific persona — students / sales reps / content creators / shoppers / developers / day traders / writers.
  3. Closest 3 competitors. URLs in CWS. Install counts. What's actually different?
  4. Is this a standalone product OR a wedge into a SaaS / community / API?

Build state 5. Built / unbuilt? If built: which manifest version + what's already published? If not: tech stack chosen? 6. Permissions you'll need (or are using): list specific ones (activeTab, storage, tabs, scripting, <all_urls>, host_permissions for specific domains). 7. Backend dependence: pure-client / cloud-API-required / freemium-with-cloud / fully-server / mixed?

Audience & monetization 8. Owned audience size: email list / X / Discord / TG / LinkedIn followers; engagement. 9. Monetization plan: one-time, subscription, freemium, lead-gen, affiliate, lifetime, ads (note: ads in extensions are a CWS violation in most cases). 10. Revenue target month-3: $X. Realistic given install funnel?

Risk 11. Compliance: CWS policy compliance audit done? If using AI / scraping / web automation — risk profile? 12. Cloneability: is your code purely-client, or does it depend on a server-side moat?

If they can't answer 8-10, the gap is the work. Many extension projects fail at idea validation (no real job) or permission scope (asking for <all_urls> for an extension that only needs one domain).

Phase 1 — Validate the idea + permission scope

The extension store rewards narrow, single-purpose tools and punishes "swiss army knife" extensions. Validate against this before building.

Single-purpose policy (CWS, also Edge / Firefox):

  • Extension must have one clear primary purpose.
  • Three small features tightly related to one purpose: OK.
  • Five unrelated features for "productivity": REJECTED.
  • Examples that pass: "Save articles to read later", "Take screenshots and annotate them", "AI-summarize YouTube videos".
  • Examples that fail: "Productivity dashboard with todo, calendar, weather, news, links" — multiple unrelated purposes.

Permission discipline (most-common rejection reason):

PermissionUse caseRisk
activeTabOperate on current tab when user clicks extension iconLow; preferred over broader permissions
tabsRead tab metadata across all tabsMid; require justification
<all_urls> (host)Read/inject on every URLHigh; CWS will scrutinize, ask for narrower
storagePersist settings + user dataLow
scriptingInject JS programmaticallyMid; usually combined with host permissions
cookiesRead/write cookiesHigh; rarely justified outside auth flows
webRequestModify network requestsHigh; deprecated in MV3 favor of declarativeNetRequest
nativeMessagingCommunicate with native appHigh; for desktop integrations
bookmarks / history / downloadsRead browser dataHigh; needs strong justification
clipboardWrite / clipboardReadClipboardMid; for paste tools etc.

Permission justification (in CWS submission):

  • 1-3 sentences PER permission explaining WHY you need it.
  • Tie back to user-visible feature.
  • "We use tabs to show the user a list of recently opened tabs in our side panel" beats "tabs needed for tab management."

Manifest V3 specifics:

  • MV3 is mandatory for new submissions and forced migration for existing extensions.
  • Service worker (no persistent background page) — handle ephemerality (state in chrome.storage, not memory).
  • declarativeNetRequest instead of webRequest blocking — limits ad-blocker / privacy extension flexibility.
  • Side panel API for richer UIs.
  • Action API (unified browserAction / pageAction).
  • Promise-based chrome.* APIs (await everywhere).

Pre-build validation gate (4 conditions):

  1. One specific job that someone does today (with effort) and would happily click "install" to make easier.
  2. Permission scope minimal: 3-4 permissions max for MVP. If you need 8 permissions, redesign.
  3. CWS policy clean: no scraping protected sites, no API circumvention, no fingerprinting / tracking, no ad injection without disclosure.
  4. Distribution path: how do users find your extension? Owned audience, SEO on extension topic, integration with adjacent product, content marketing? "Hope CWS search finds us" = not a path.

Common failed validations:

  • "Productivity dashboard" — multi-purpose, rejected.
  • "AI assistant for everything" — scope too broad, can't write justification.
  • "Tracks all browsing for insights" — privacy / fingerprinting flag, will be rejected.
  • "Auto-fills LinkedIn / Twitter / Facebook" — requires <all_urls> and looks like spam tool.
  • "Auto-bid eBay / scalp tickets" — ToS violation of target site, rejected on other grounds.

Phase 2 — Manifest V3 architecture

The right architecture survives CWS review and runs efficiently.

Architecture decision tree:

Use caseArchitectureNotes
Show UI on click of iconAction popup or side panelSide panel for sustained interaction; popup for quick actions
Modify a specific websiteContent script + activeTab + host_permissions on that domainNarrow host_permissions
Background processing (sync, polling, timers)Service worker + chrome.alarmsService worker can sleep; use alarms for periodic
Heavy AI / LLM callsService worker → cloud API; never embed modelNetwork calls fine; embedded models = bundle bloat
Content extraction / clippingContent script + chrome.scripting.executeScriptAvoid persistent listener if not needed
Cross-tab statechrome.storage.local / .syncsync syncs across user's browsers; local doesn't
Real-time updates from serverWebSocket in service worker (with reconnection logic)Service worker can sleep; reconnect on wake
Native macOS integration (Safari)Wrap in Xcode app project, distribute via Mac App StoreDifferent distribution model

Project structure (recommended):

extension/
  manifest.json
  background/
    service_worker.js
  content/
    content_script.js
  popup/ (or panel/)
    index.html
    index.js
  options/
    options.html
    options.js
  shared/
    api.js
    storage.js
  icons/
    16.png 32.png 48.png 128.png

Service worker rules:

  • Stateless — never rely on in-memory state surviving sleep.
  • Use chrome.storage for persistence.
  • Use chrome.alarms for periodic work (instead of setInterval).
  • Listen to chrome.runtime.onInstalled / onStartup for setup.

Content script rules:

  • Run in isolated world (can't directly access page's JS variables).
  • Use postMessage / window.dispatchEvent for cross-context communication when needed.
  • Inject style cleanly (CSS modules / shadow DOM); avoid breaking host site's styles.
  • Handle SPA route changes (MutationObserver / history listeners).

Build & bundle:

  • Vite / Webpack / Rollup with extension-specific config (multi-entry: background, content, popup).
  • TypeScript recommended (catches Chrome API misuse).
  • Don't ship unminified code — CWS scans, but minified is acceptable + reviewable.
  • Source maps optional; keep them out of production for IP / cloning defense.

Cross-browser strategy:

  • Single codebase targeting Chromium (Chrome / Edge / Brave / Opera).
  • Firefox: minor manifest tweaks; firefox-specific keys (browser_specific_settings.gecko.id).
  • Safari: wrap in Xcode app extension; distinct distribution.

Phase 3 — Store submission & review survival

CWS review takes 3-7 days typical, longer for risky extensions. Get it right the first time.

Submission checklist:

  • Manifest V3 with explicit permissions and host_permissions.
  • Permissions justification written for each (in store form).
  • Privacy practices form filled honestly (data collected, data sold = NEVER, data shared).
  • Privacy policy URL (publicly hosted page).
  • Single-purpose statement (1-2 sentences).
  • Description (~250-1000 chars; first 132 chars are search snippet).
  • 1-5 screenshots (1280×800 or 640×400 PNG/JPEG).
  • 1 promotional tile (440×280) — required for paid; optional otherwise.
  • Optional small/large/marquee tiles for featured slots.
  • Demo video (YouTube link recommended; 30-90s).
  • Category: pick the most-specific one.
  • Languages: list supported locales.
  • $5 one-time developer fee (CWS).
  • Submit for review.

Privacy practices — be honest:

  • "We collect: user activity / website content / personally identifiable info..." — be specific.
  • Lying gets caught at review or post-launch by user reports → permanent ban.
  • Most legitimate extensions collect minimal data; explain why.

Common rejection reasons:

  1. Excessive permissions without justification matching extension's visible feature.
  2. Single-purpose violation — extension does too many unrelated things.
  3. Misleading description — promises features extension doesn't have.
  4. Unsolicited content — extension injects ads / promos / pop-ups not core to its purpose.
  5. Spam / low quality — too similar to existing extension, no unique value, <5 minimum installs to validate.
  6. Privacy policy issue — missing or broken privacy policy URL.
  7. Code obfuscation beyond standard minification — CWS bans heavy obfuscation.
  8. Use of remote code — fetching JS from server and executing dynamically (mostly disallowed).
  9. Trademark issues — using Google / YouTube / Facebook in title without authorization.
  10. Auto-update mechanism — must use CWS update channel; can't sideload.

Appeal process:

  • Reply to rejection email with specific changes made.
  • Tone: factual, not defensive. "We've removed <all_urls> permission and now use only activeTab. Our privacy policy now lists data collection clearly."
  • Sometimes goes back-and-forth 2-3 rounds; usually resolvable if violation is genuine fix-able category.
  • 30-day appeal window typical.

Edge / Firefox AMO:

  • Edge: Microsoft Partner Center; copy submission from CWS, adjust manifest if needed; review takes ~7 days.
  • Firefox AMO: separate submission; review can be faster (1-3 days for unprivileged extensions); strict on remote code.
  • Safari: macOS App Store; xcrun + notarization; longest review (1-2 weeks).

Post-launch updates:

  • Each new version goes through review (faster typically, 1-3 days).
  • Don't push every commit — batch fixes and ship on cadence (weekly or bi-weekly).
  • Major changes to permissions: Chrome shows users a permissions warning. They can decline and the extension is disabled until they re-accept. Plan migrations carefully.
  • Gradual rollout: CWS supports % rollout per region; useful for big features.

Phase 4 — Monetization (without alienating users)

Browser extensions monetize differently than SaaS. The CWS deprecated in-app purchases in 2020; you must roll your own with backend + Stripe.

Monetization options:

ModelBest forConversionTrade-off
Free + own SaaSExtension is wedge to SaaS subscription1-5% extension users → SaaSExtension is loss-leader; need backend + Stripe
One-time purchaseStandalone tool, $9-49 price5-15% try → buyLimited recurring revenue
Subscription (own backend)Cloud-dependent extensions, $5-30/mo2-8% activate → paidBackend ops overhead
Freemium with paid tierFree core feature, paid pro3-12% free → paidHard to design free vs paid line
Lifetime deal (AppSumo, PitchGround)Launch boost, validate willingness-to-pay100-1000 deals at $19-79Caps future LTV; gives revenue today
Lead-gen / affiliateComparison / recommendation extensionsPennies per clickAligns incentives badly with users; CWS scrutiny
Enterprise licensingB2B teams of 10+, $5-25/seat/moSlow sales cycleHigh LTV; needs SSO / admin controls

The "freemium done right":

  • Free tier: full feature for limited usage / fewer items / "lite" experience.
  • Paid tier: unlimited usage, advanced features, sync across devices, priority support.
  • Examples done well: Loom (free clips, paid recording features), Notion Web Clipper (free, but the SaaS is paid), Grammarly (free basics, paid pro).

Pricing anchors:

  • One-time: $9 / $19 / $29 / $49. Above $49 = needs strong sell.
  • Subscription: $5/mo / $9/mo / $19/mo / $29/mo. $5 floor; below feels low-value.
  • Annual discount: 30-40% off vs monthly. Don't force annual.
  • Lifetime deal: $39-99 typical. AppSumo cuts 70% (you keep 30%).

Backend stack for paid extensions:

  • Identity: simple email/password (Auth0 / Clerk / Supabase Auth) OR OAuth via Google.
  • Subscription: Stripe Subscriptions (or Lemon Squeezy MoR for tax handling).
  • License check: extension calls backend on action; cache for 1-7 days; offline grace period.
  • License revocation on unpaid / chargeback.

License-check pattern (typical):

// On extension init / interaction:
const license = await chrome.storage.local.get('license');
if (license.lastCheck > Date.now() - 7*24*3600*1000) {
  if (license.valid) return; // recent valid check
}
// Stale or missing — call backend
const res = await fetch('https://api.example.com/license/check', {
  headers: { Authorization: `Bearer ${license.token}` }
});
if (!res.ok || (await res.json()).valid !== true) {
  // Show paywall / disable feature
}

Paywall UX rules:

  • Don't paywall unexpectedly (after user invested time). Paywall before action OR offer free-quota visible up-front.
  • Offer "try before buy": 7-day free trial OR 5 free uses, then paywall.
  • Make payment frictionless: Stripe Checkout in new tab, redirect back to extension.
  • Don't tease features in extension UI that are paid-only without context — gives bad first impression.

Monetization anti-patterns:

  • Switching free-forever extension to paid retroactively (user revolt + 1-star reviews).
  • Adding ads to a tool extension (CWS rejects most cases).
  • "Donation" buttons hidden in settings (low conversion).
  • Selling user data / behavior — CWS ban + brand-killing news cycle if discovered.

The "wedge to SaaS" pattern (recommended for many):

  • Extension is FREE forever, distribution channel.
  • It captures user email / signup → SaaS account.
  • Power features happen in web app (paid).
  • Examples: Notion Web Clipper, Grammarly, Loom, Clearbit Connect, Mixmax.
  • Conversion: 1-5% of installs → SaaS signup → 10-30% of signups → paid.

Phase 5 — Anti-cloning + defensibility

Pure-client Chrome extensions are nearly impossible to defend; clones appear within 30 days of any successful extension. Build defensibility deliberately.

Defensibility ladder (low → high):

  1. Pure-client logic (zero defense): JS in extension, anyone can copy. CWS even unpacks extensions; reverse-engineering is trivial.
  2. Server-side logic + license check (low defense): clones can replicate UI but not the server features. Helps but doesn't stop clones with different backend.
  3. Proprietary data / API (mid defense): extension calls your unique data source. Cloners would need to replicate or pay for data.
  4. Network effect on server (mid-high): extension users contribute data that improves the server (e.g., crowd-sourced rules, user reviews). Clones don't have your network.
  5. Brand + distribution (high): you have 50K installs + 1K paying customers. Cloners can't easily steal your existing user base.
  6. Vertical SaaS where extension is wedge (highest): the real product is the SaaS; extension is one entry point. Cloners may copy extension but not the SaaS.

Tactical anti-clone:

  • DMCA takedown to CWS for direct copies (often successful for code-level copies, less for "inspired-by").
  • Trademark your extension name (USPTO basic $250) — gives takedown leverage on copy-cats using your name.
  • Server-side feature gating: hardest features behind authenticated server calls.
  • Watermark unique strings in your code; if they appear in a cloned extension, easy DMCA.
  • Don't ship source maps to production.
  • Obfuscation beyond minification is largely a waste — CWS allows minification; clones de-obfuscate quickly anyway. Don't burn time on this.

Brand & community moat:

  • Engaged user community (Discord / forum / GitHub Discussions).
  • Active feature development showing momentum.
  • Partner integrations (extension talks to Slack / Notion / Linear).
  • Content / SEO for your extension's topic.

Phase 6 — Marketing & growth

Most extensions get installs from CWS internal search + word-of-mouth + adjacent ecosystem.

CWS search ranking factors (informally, from observation):

  • Title (relevance to query, weight high).
  • Short description (132 chars; relevance).
  • User rating (4.5+ ranks higher).
  • Install count + active install count.
  • Reviews count.
  • Update freshness (recently-updated extensions rank higher).
  • Featured / Editor's Pick badges.
  • Translation to multiple languages.

Optimize the listing:

  • Title: pattern "{Product Name} – {Job}" e.g., "Tabby – Save Tabs for Later".
  • Short description: 132 chars; clear job + key benefit + CTA.
  • Long description: structured with headers; mention key features, use cases, comparisons (without slander).
  • Screenshots: 5 max; show product in real use; first screenshot should be the most compelling.
  • Promo video: 30-90s; demonstrates THE flow (open, do thing, value).

Acquisition paths:

  1. CWS internal search (slow, compounding): SEO of listing content. ~10-30% of organic installs at maturity.
  2. Adjacent ecosystem (high-converting): if your extension complements a popular SaaS (Notion / Linear / Figma / Zendesk), do an integration page on their marketplace.
  3. Content marketing: SEO blog targeting your job's queries ("how to save tabs in Chrome"). 6-12 months to compound.
  4. Twitter / X build-in-public: shipping updates, screenshots, vibes. 2K-30K followers compounds.
  5. Product Hunt launch: 1-day spike of 50-500 installs typical; doesn't sustain but seeds reviews.
  6. Reddit / Hacker News: targeted subreddits and Show HN posts; works for technical extensions.
  7. YouTube / TikTok: tutorials featuring your extension; pay creators or partnership.
  8. Email list: own a 1K-50K list of relevant audience; convert 10-30% on email launch.
  9. Partnership: extensions for B2B partners (their users → your installs in exchange for branding).
  10. Paid ads: Google Search ads on competitor names (high CPC, sometimes profitable for premium tools).

Reviews + ratings:

  • Ask happy users in-extension (one-time, post-positive-action) to leave a review. CWS rules limit this; never block UI on review.
  • 4.5+ stars rank significantly higher.
  • Respond to reviews (1-star and 5-star) — shows engagement.
  • Don't fake reviews (CWS bans extensions for this).

Featured / Editor's Pick:

  • Curators pick extensions that are unique, polished, single-purpose, follow CWS policies religiously.
  • Reach out via Google for Developers programs; feature requests rarely succeed cold.
  • Better path: be active in extension community, get noticed by Google DevRel.

Phase 7 — Update / version / review hell

The "next-version review rejected" scenario kills momentum. Plan for it.

Versioning discipline:

  • Semantic versioning (1.2.3); update manifest version on every push.
  • Don't push 5 minor updates per week — review fatigue.
  • Internal QA: install zip locally, smoke-test, before submitting.
  • Beta channel: Chrome supports unlisted extensions for beta testers; iterate without going through public review.

Permissions migration:

  • If you NEED to add a permission post-launch:
    • User sees a permissions warning on next update.
    • Can decline → extension disabled until accepted.
    • Plan release notes that explain WHY new permission is needed.
    • Some users WILL churn on permission expansion.
  • Better: ship with conservative permissions; use optional permissions if growing.

Optional permissions (chrome.permissions.request):

  • Permissions requested at runtime when user uses related feature.
  • Less dropoff than manifest-required permissions.
  • Recommended for any permission not core to extension.

Phase 8 — Scale / portfolio / SaaS path

One extension → multi-extension portfolio:

  • Pros: brand recognition, leverage learnings, cross-promotion.
  • Cons: support load grows, focus splinters.
  • Ratio: at 5K+ active users on extension 1, consider extension 2 only if it serves the same niche.
  • Don't build 5 unrelated extensions hoping for portfolio income.

Extension → standalone SaaS:

  • Path: extension installs → email captures → SaaS account creation → paid tier conversion.
  • Examples: Loom (extension + desktop + web app), Grammarly (extension + web + mobile), Mixmax (extension + email + sales features).
  • Math: 100K extension installs → 5K SaaS signups → 500 paid at $20/mo = $10K MRR. Extension becomes leverage, not the product.

Extension → enterprise:

  • B2B teams installing en masse via Chrome admin (managed extensions policy).
  • Sales motion: outbound to IT / RevOps; SSO / SCIM provisioning; admin dashboard.
  • Pricing: $5-25/seat/mo; team minimums.

Extension → API / dev tools:

  • If your extension does something useful (data extraction, API normalization), expose it as a paid API for other devs.
  • Extension is the "marketing" + first-touch; API is the revenue.

Phase 9 — Common mistakes (by category)

Idea / scope:

  • Multi-purpose extension that fails single-purpose review.
  • Solving for "myself only" niche (no demand).
  • Cloning a popular extension without differentiation.

Permissions:

  • <all_urls> when one domain would do.
  • tabs permission without clear UI feature using it.
  • Fingerprinting via chrome.tabs.query polling — flagged at review.

Code:

  • Persistent background page (deprecated; MV3 mandatory).
  • In-memory state in service worker (will be lost).
  • Heavy dependencies bundled (extension > 5MB risks slow installs).
  • Direct fetch to remote JS execution (forbidden in MV3).

Submission:

  • Privacy policy URL broken or placeholder.
  • Misleading screenshots (showing features extension doesn't have).
  • Generic icon / poorly-cropped screenshots.
  • Description full of keyword stuffing.

Monetization:

  • Surprise paywall after free use.
  • Adding ads to a tool that didn't have them.
  • Selling user data.

Anti-cloning / IP:

  • Pure-client logic that's trivially copied.
  • Source maps shipped to prod.
  • No trademark on extension name.

Updates:

  • Pushing too many small versions; review fatigue.
  • Adding broad permissions in update without user-facing justification.
  • Major UI refactor without warning users.

Diagnostic outputs (what you produce after a session)

For every coaching session, produce in this order:

  1. Idea + permission verdict: viable / pivot / kill, with single-purpose check + permission scope.
  2. Architecture recommendation: MV3 layout, content vs background split, side panel vs popup, backend dependence.
  3. Store-listing plan: title, description, screenshots, video, justification text.
  4. Monetization recommendation: model + price + paywall placement.
  5. Defensibility assessment: realistic moat or commodity product.
  6. Anti-pattern flags (1-3 traps THIS builder is closest to falling into).
  7. 30/60/90 day milestones: launch, 1K installs, monetization activation.
  8. Single biggest action for the next 14 days. ONE thing.

If builder pushes back ("I want to ship every feature"): re-run the diagnostic. Single-purpose discipline is the single biggest predictor of CWS success. Coaching is pressure on the cuts, not affirmation of bloat.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

Codex Orchestrator

Monitor, control, and orchestrate background Codex sessions. Use this skill to track progress, handle interruptions, and ensure task completion for long-running coding tasks.

Registry SourceRecently Updated
Coding

sugerclawdy skill

Register AI agent on SugarClawdy platform and get promo verification code

Registry SourceRecently Updated
Coding

flaw0

MoltGuard — Protect you and your human from prompt injection, data exfiltration, and malicious commands. Source: https://github.com/openguardrails/openguardr...

Registry SourceRecently Updated
Coding

Lightpanda browser

Lightpanda browser, drop-in replacement for Chrome and Openclaw default browser - faster and lighter for tasks without graphical rendering like data retrieval. Use it with CDP clients like Playwright or Puppeteer.

Registry SourceRecently Updated