Data Analyst
v1.0.0Analyze data to identify actionable insights using the DICE framework: define questions, investigate, communicate findings, and evaluate impact for clear dec...
⭐ 0· 795·1 current·1 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name and README match the SKILL.md content: an analyst methodology (DICE), profiling/checklist, SQL templates and reporting guidance. It does not request unrelated binaries, credentials, or system access.
Instruction Scope
The runtime instructions stay within data-analysis scope (profiling, cleaning, SQL templates, visualization guidance). They assume the agent or operator will run queries against databases or read spreadsheets; the SKILL.md does not instruct reading unrelated system files or exfiltrating data. Caution: the templates imply running SQL against your data — only provide least-privilege (read-only, replica or limited) access when connecting any agent to a DB, and review any queries before execution.
Install Mechanism
No install spec or code is included (instruction-only), so nothing is written to disk or auto-downloaded by the skill. The README shows a user-facing 'clawhub install' example and an external link for paid content, but the package metadata contains no automated installer.
Credentials
The skill declares no required environment variables, credentials, or config paths. In practice, to run the provided SQL the agent will need database access supplied by the user — that is a user decision and should be restricted to read-only, minimal-scope credentials.
Persistence & Privilege
The skill is not always-enabled, is user-invocable, and does not request persistent system-level privileges or modifications to other skills. Autonomous invocation is allowed (default) but there are no added privilege escalations in the skill itself.
Assessment
This skill is an instruction-only methodology for data analysis and appears internally consistent. Before using it: (1) do not give the agent production write or broad credentials — provide read-only, least-privilege access (prefer a replica or limited dataset); (2) review and approve any SQL the agent proposes before execution; (3) be cautious about granting access to shared drives/spreadsheets—limit scope to only the files needed; (4) the README links to external paid content—treat external links and purchases like any third-party site; (5) because it's instruction-only, it won't run code by itself, but the agent may ask you to run queries or upload files—verify each request.Like a lobster shell, security has layers — review code before you run it.
analysisvk9727c64szkttmn5tx6kmxhsfs813hcdanalyticsvk9727c64szkttmn5tx6kmxhsfs813hcddashboardvk9727c64szkttmn5tx6kmxhsfs813hcddatavk9727c64szkttmn5tx6kmxhsfs813hcdlatestvk9727c64szkttmn5tx6kmxhsfs813hcdreportingvk9727c64szkttmn5tx6kmxhsfs813hcdsqlvk9727c64szkttmn5tx6kmxhsfs813hcd
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
