KPI Tracker
v1.0.0Track, analyze, and report business KPIs with targets, status flags, trend analysis, and root cause prompts using configurable JSON files.
⭐ 0· 836·8 current·9 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name and README describe KPI definition, recording, trend analysis, and report generation — and the SKILL.md only requires local config/data JSON files and optional report output, which is proportionate to that purpose.
Instruction Scope
Runtime instructions are explicit and scoped: read kpi-config.json, read/write kpi-data.json, and optionally write reports to reports/*.md. There are no instructions to access unrelated system files, credentials, or external endpoints (links are only references to third-party resources).
Install Mechanism
No install spec or code files are present (instruction-only). The README's example 'clawhub install' is a usage hint but there is no installer payload to write or execute on the system.
Credentials
The skill declares no required environment variables or credentials, which is appropriate for a local KPI tracker that stores data in workspace JSON files.
Persistence & Privilege
The skill does not request permanent/always-on presence and does not modify other skills or system-wide settings. It requires workspace file read/write access (expected and limited in scope).
Assessment
This skill is instruction-only and behaves like a lightweight, local KPI manager: it will read kpi-config.json and read/write kpi-data.json in your workspace and can write markdown reports to reports/*.md. Before using it, (1) review or create the kpi-config.json so it only contains non-sensitive metric names, (2) store kpi-data.json in a location you control (don’t point it at a folder containing secrets), and (3) be cautious if you connect the agent to external channels (Slack/Telegram) or set up automatic cron jobs — those integrations are not implemented by the skill and may require separate credentials and review. No network endpoints, installs, or credentials are requested by the skill itself. If you need stricter isolation, run the agent with a workspace that only contains KPI data.Like a lobster shell, security has layers — review code before you run it.
analyticsvk97e76dhep3e89sff7v13gbm5s8133p1businessvk97e76dhep3e89sff7v13gbm5s8133p1kpivk97e76dhep3e89sff7v13gbm5s8133p1latestvk97e76dhep3e89sff7v13gbm5s8133p1metricsvk97e76dhep3e89sff7v13gbm5s8133p1reportingvk97e76dhep3e89sff7v13gbm5s8133p1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
