Pricing Strategy
v1.0.0Analyze and optimize product or service pricing using value-based, cost-plus, competitive, and tiered models with actionable recommendations.
⭐ 0· 1.5k·8 current·8 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md content: frameworks (value-based, cost-plus, tiered), willingness-to-pay, competitor matrices and revenue impact modelling are all appropriate for a pricing-analysis skill. No unrelated capabilities or credentials are requested.
Instruction Scope
Runtime instructions ask for pricing inputs (current price, target segment, competitors, costs, conversion rates) which are necessary for the task. The instructions do not direct the agent to read system files, environment variables, or send data to unexpected endpoints. External resources are cited but only as links.
Install Mechanism
No install spec and no code files are present; this is instruction-only, which minimizes disk/exec risk. The provided external links point to a GitHub Pages domain, not an executable download.
Credentials
The skill requests no environment variables, credentials, or config paths. The inputs it asks the user to provide are business data (pricing, costs, competitors), which are proportionate to the stated functionality.
Persistence & Privilege
always is false and the skill does not request elevated or persistent system presence. Model invocation is allowed (platform default) but the skill itself does not request special privileges or modify other skill settings.
Assessment
This skill appears coherent and low-risk from a platform/security perspective, but note: (1) you'll be asked to provide sensitive business data (prices, costs, conversion rates, competitor info) — only share what you are comfortable exposing; (2) the README/SKILL.md links point to external pages (afrexai-cto.github.io) including paid 'context packs'—verify those sites before clicking or paying; (3) because the skill can be invoked autonomously by the agent (platform default), review the agent's permissions and what inputs you allow the agent to submit if you integrate this into an automated workflow. If you want higher assurance, ask the publisher for an explicit privacy/data-handling statement or a version with no external links to paid resources.Like a lobster shell, security has layers — review code before you run it.
latestvk9732favtnfesrgegarh24g985815gmepricingvk9732favtnfesrgegarh24g985815gmerevenuevk9732favtnfesrgegarh24g985815gmesaasvk9732favtnfesrgegarh24g985815gmestrategyvk9732favtnfesrgegarh24g985815gme
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
