shortenShorten URLs using is.gd (no auth required). Returns a permanent short link.
Install via ClawdBot CLI:
clawdbot install kesslerio/shortenGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://is.gdAudited Apr 17, 2026 · audit v1.0
Generated Mar 1, 2026
Marketing teams can shorten URLs for social media posts to save character space and track engagement indirectly via custom aliases (if implemented). Useful for platforms like Twitter with strict character limits, enhancing link aesthetics and click-through rates.
Event organizers can shorten links to registration pages or event details for printed materials like flyers and business cards. This makes URLs more manageable and reduces errors when attendees manually type them in.
Companies can use shortened URLs in internal wikis or emails to share long resource links, such as to cloud storage or project management tools, improving readability and reducing clutter in communications.
Online retailers can shorten product links for email newsletters or SMS marketing, making them more user-friendly and potentially increasing conversion rates by simplifying the customer journey to purchase pages.
Offer basic shortening for free to attract users, then charge for premium features like custom aliases, analytics dashboards, and higher rate limits. Revenue can come from subscription tiers or one-time payments for advanced tools.
Provide this skill as an API that developers can integrate into their applications, such as social media apps or content management systems. Charge based on usage volume, such as per number of shortened URLs or API calls.
License the shortening technology to businesses that want to brand their own short URLs, such as for corporate marketing campaigns. Offer customization options and support services for a recurring fee.
💬 Integration Tip
Integrate this skill into command-line tools or automation scripts for batch URL shortening, ensuring to handle rate limits by adding delays between requests to avoid service disruptions.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.