Market Sizing — TAM/SAM/SOM Calculator

v1.0.0

Calculate defensible TAM, SAM, and SOM market sizes using top-down and bottom-up methods with source citations for pitches and business cases.

0· 707·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and SKILL.md describe TAM/SAM/SOM calculations and triangulation; the instructions and examples align with that purpose and do not request unrelated capabilities.
Instruction Scope
Instructions are scoped to market-sizing methodology (top-down, bottom-up, triangulation, and citation of public sources). One caution: the bottom-up step mentions counting reachable customers via "databases, directories, LinkedIn," which implies the agent may ask to access external datasets or accounts — the skill itself does not supply credentials or code to do so. If you grant the agent access to private company databases or a LinkedIn session, that would be outside this skill and deserves separate review.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. There are no disproportionate or unexplained secret requests.
Persistence & Privilege
always is false and default autonomy settings apply. The skill does not request persistent system changes or elevated privileges.
Assessment
This is an instruction-only market-sizing skill that appears coherent with its stated purpose. Because it may recommend using external datasets (e.g., directories or LinkedIn), do not grant your agent access to private company databases, personal accounts, or API keys unless you explicitly trust the downstream tool and understand what data will be accessed. Verify all cited sources and assumptions before using numbers in investor materials. Note the README contains promotional links to paid "context packs" — those are external commercial resources, not required for the skill to work.

Like a lobster shell, security has layers — review code before you run it.

business casevk97e5z9hfs0ffda846rb83sd59813xkygo-to-marketvk97e5z9hfs0ffda846rb83sd59813xkylatestvk97e5z9hfs0ffda846rb83sd59813xkymarket sizingvk97e5z9hfs0ffda846rb83sd59813xkypitch deckvk97e5z9hfs0ffda846rb83sd59813xkysamvk97e5z9hfs0ffda846rb83sd59813xkysomvk97e5z9hfs0ffda846rb83sd59813xkytamvk97e5z9hfs0ffda846rb83sd59813xky

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments