Promotion Planning

v1.0.0

Develop promotion strategies and discount recommendations based on historical data analysis

0· 99·0 current·0 all-time
by走过@1970168137
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and runtime instructions align: the skill asks for business context and data to produce promotion strategies and deliverables. It does not request unrelated tools, credentials, or system access.
Instruction Scope
SKILL.md is instruction-only and asks the user to copy/paste business context, data, and documents. It does not instruct the agent to read system files or environment variables, nor to call external endpoints. Warning: asking users to paste data can lead to accidental disclosure of PII/credentials; outputs may include scripts or plans that must be reviewed before execution.
Install Mechanism
No install spec and no code files — instruction-only skill, which minimizes installation risk and disk writes.
Credentials
The skill requests no environment variables, credentials, or config paths. The only data access is what the user pastes into the prompt; users should avoid providing secrets or sensitive files in that input.
Persistence & Privilege
No always:true flag, no persistent installation, and no modification of other skills or system settings. The skill can be invoked by the agent (normal behavior) but is not force-included.
Assessment
This skill appears to do what it claims and does not request credentials or install software. However, do not paste unredacted sensitive data (passwords, API keys, customer PII, financial account numbers) into the input prompt — instead provide sanitized or synthetic examples or aggregated summaries. If you need to share datasets, redact or share only the necessary fields or statistics. Review any generated scripts, SQL, or automation steps in a safe environment before running them. Finally, treat the skill's recommendations as advisory: validate major financial, legal, or compliance actions with appropriate domain experts.

Like a lobster shell, security has layers — review code before you run it.

latestvk9763r2dgpahrdr1ry3jn4102983d969

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments