Cleaning Business Operations

v1.0.0

Expertise in cleaning business operations including pricing, bidding, staffing, compliance, quality control, and scaling from solo to multi-crew commercial a...

2· 330·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (cleaning business operations: pricing, bidding, staffing, compliance, scaling) match the SKILL.md and README content. The skill does not request unrelated binaries, credentials, or filesystem access that would be disproportionate to an operations knowledge pack.
Instruction Scope
SKILL.md contains static operational guidance, pricing tables, checklists, and playbooks. It does not instruct the agent to read system files, access environment variables, post data to external endpoints, or perform actions outside the domain of advising on cleaning business operations.
Install Mechanism
There is no install specification and no code files — the skill is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The skill requests no environment variables, credentials, or config paths. All required data is embedded in the documentation, which is proportionate for a reference/consultant skill.
Persistence & Privilege
Flags show always:false and normal autonomous invocation allowed. The skill does not request persistent privileges, does not modify other skills or system configuration, and requires no special platform privileges.
Assessment
This skill is a static reference pack and appears coherent with its stated purpose. Before installing, consider: (1) the author/source is not a known company homepage in the metadata—if provenance matters to you, verify the publisher; (2) treat the provided pricing, insurance, and compliance figures as starting points — confirm local regulations, current market rates, and exact insurance requirements for your jurisdiction; and (3) if you allow autonomous agent invocation, ensure the agent is not granted unrelated system/network permissions that could be abused by any skill the agent autonomously invokes.

Like a lobster shell, security has layers — review code before you run it.

cleaningvk972wzcganc5f9wvjp11vphknx821jfvjanitorialvk972wzcganc5f9wvjp11vphknx821jfvlatestvk972wzcganc5f9wvjp11vphknx821jfvoperationsvk972wzcganc5f9wvjp11vphknx821jfvservice businessvk972wzcganc5f9wvjp11vphknx821jfv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments