Bcp Plan
v1.0.0Comprehensive business continuity planning including emergency plans, critical alternatives, drill scripts, and recovery procedures. Covers risk assessment,...
⭐ 0· 87·0 current·0 all-time
by走过@1970168137
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (BCP planning) match the SKILL.md content: it asks for business functions, risks, objectives, capabilities, and dependencies and returns a BCP document, risk assessment, procedures, drills, and communication plan. Nothing requested is extraneous to creating a BCP.
Instruction Scope
SKILL.md is an instruction-only manifest that only specifies input fields and expected outputs. It does not direct the agent to read files, access environment variables, call external endpoints, or collect system state outside the provided user inputs.
Install Mechanism
No install spec and no code files are present. As an instruction-only skill it does not install binaries or download artifacts, minimizing installation risk.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no disproportionate secret or credential requests relative to its stated purpose.
Persistence & Privilege
always is false and the skill is user-invocable; model invocation is allowed (the normal default) but the skill has no ability to persist or modify other skills or system configuration.
Assessment
This skill appears coherent and low-risk because it only defines inputs and outputs for generating a business continuity plan. Before using it: do not paste secrets, passwords, or sensitive credentials into the input fields; treat the generated plan as draft content that must be reviewed and validated by domain experts and legal/compliance teams; verify any regulatory or jurisdictional requirements yourself; and be cautious about sharing finalized operational or contact details produced by the tool with third parties. Additionally, watch for inaccuracies or hallucinations in technical recommendations — review and test procedures before relying on them in an emergency.Like a lobster shell, security has layers — review code before you run it.
latestvk972sqg2v03f47wje5khnk4d3x83eshq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
