Data Room Checklist

v1.0.0

Generate a tailored data room folder structure, document checklist with priorities, gap analysis, and access control guidance for fundraising, M&A, or due di...

0· 459·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (data room checklist and folder hierarchy) align with the SKILL.md and README; no unexpected binaries, env vars, or permissions are requested. The README does advertise a paid context pack, which is marketing but not inconsistent with the skill's stated function.
Instruction Scope
SKILL.md instructs the agent to produce folder trees, prioritized checklists, gap analyses, prep-time estimates, and access-control guidance — all within the stated purpose. It does not direct the agent to read local files, env vars, or contact external endpoints. Note: users will likely provide sensitive company details (financials, contracts) as input; the SKILL.md does not address handling or storage of those inputs.
Install Mechanism
No install spec and no code files (instruction-only), so nothing is written to disk or fetched at install time — lowest-risk pattern.
Credentials
No environment variables, credentials, or config paths are required. This is proportionate to a template/checklist generator.
Persistence & Privilege
always:false and default autonomous invocation are normal. The skill does not request persistent presence or system-wide configuration changes.
Assessment
This skill appears coherent and low-risk, but be cautious about the sensitive inputs it will need (financials, contracts, employee data). Before using, verify the agent/platform's data retention and sharing policies, avoid pasting full confidential documents or PII unless you trust the platform, and treat the output as a drafting/template aid — have legal counsel review any documents flagged as needing legal review. If you prefer, provide anonymized or summarized inputs rather than raw documents.

Like a lobster shell, security has layers — review code before you run it.

data-roomvk973g183th4826r29zdyde72vd81nm8adue-diligencevk973g183th4826r29zdyde72vd81nm8afundraisingvk973g183th4826r29zdyde72vd81nm8alatestvk973g183th4826r29zdyde72vd81nm8aseries-avk973g183th4826r29zdyde72vd81nm8astartupvk973g183th4826r29zdyde72vd81nm8a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments