Cash Flow Forecast

v1.0.0

Build a 13-week rolling cash flow forecast from your current balance, expected income, and expenses, highlighting weeks below your cash buffer.

0· 721·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name and README describe a 13-week cash forecast and the SKILL.md only asks for user-provided balances, incomes, and expenses — there are no unrelated env vars, binaries, or install steps requested.
Instruction Scope
Runtime instructions are limited to building the forecast from user-supplied numbers, using the current date for week boundaries and producing scenario comparisons; they do not instruct reading unrelated files, accessing external services, or exfiltrating data.
Install Mechanism
No install spec and no code files — instruction-only skill with nothing written to disk or downloaded during install.
Credentials
The skill requires no environment variables, credentials, or config paths; this is proportional for a tool that only processes user-supplied financial data.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges. It is user-invocable and may be invoked autonomously by the agent (platform default), which is appropriate here.
Assessment
This skill appears coherent and safe in that it only uses the numbers you paste to produce a forecast and requests no credentials or installs. Before using it, avoid pasting sensitive authentication credentials (bank logins, full account numbers, passwords). Treat the forecast output as local agent work — if you later connect automation (bank APIs, invoicing systems) you'll need to provide third-party API keys, which you should only give to trusted integrations. If you need higher assurance, test with redacted or synthetic data first and confirm your agent environment does not forward data to external endpoints.

Like a lobster shell, security has layers — review code before you run it.

burn ratevk9720swe9qkbqy6m9y14r7p8b1812wzacash flowvk9720swe9qkbqy6m9y14r7p8b1812wzafinancevk9720swe9qkbqy6m9y14r7p8b1812wzaforecastvk9720swe9qkbqy6m9y14r7p8b1812wzalatestvk9720swe9qkbqy6m9y14r7p8b1812wzarunwayvk9720swe9qkbqy6m9y14r7p8b1812wza

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments