Change Management Planner
v1.0.0Generates comprehensive change management plans including stakeholder impact, communication, training, resistance mitigation, rollout phases, and success met...
⭐ 0· 637·1 current·1 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and instructions describe producing change management artifacts (stakeholder maps, communication plans, rollout phases) and the skill requests no unrelated binaries, env vars, or configs — this is proportionate to its purpose.
Instruction Scope
SKILL.md stays within scope: it asks the user to describe the initiative (what, why, timeline, budget, org info) and instructs the agent to produce structured plans. It does not direct the agent to read local files, access system state, or exfiltrate data.
Install Mechanism
No install spec and no code files are included — the skill is instruction-only, so it does not write to disk or pull external binaries.
Credentials
The skill declares no required environment variables, credentials, or config paths. The information it requests from the user (initiative details) is reasonable for generating a plan.
Persistence & Privilege
always is false and the skill does not request elevated persistence or modify other skills' configs. Model invocation is enabled (default), which is expected for a user-invocable planning skill.
Assessment
This skill is instruction-only and appears coherent, but be cautious about the content you provide: do not paste sensitive personal data (employee PII), credentials, or proprietary documents into prompts. Review any plans the agent generates for legal, regulatory, or HR compliance before acting. If you want the agent to store or share generated plans, ensure you use a secure storage/location and consider redaction of sensitive details. Finally, verify external links in the README yourself if you plan to follow them — they are informational and not required for the skill to run.Like a lobster shell, security has layers — review code before you run it.
ADKARvk9757bzzr8pqc68wn3ap45jn0h812cj1change managementvk9757bzzr8pqc68wn3ap45jn0h812cj1latestvk9757bzzr8pqc68wn3ap45jn0h812cj1organizational changevk9757bzzr8pqc68wn3ap45jn0h812cj1rollout planningvk9757bzzr8pqc68wn3ap45jn0h812cj1stakeholder analysisvk9757bzzr8pqc68wn3ap45jn0h812cj1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
