RFP & Proposal Responder
v1.0.0Generates structured RFP responses including executive summary, requirements matrix, pricing, risk mitigation, timeline, and differentiators from your input.
⭐ 0· 735·0 current·0 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and SKILL.md describe transforming RFPs into proposal drafts. There are no unrelated environment variables, binaries, or install steps requested that would be disproportionate to that purpose.
Instruction Scope
Runtime instructions simply ask the user to paste the RFP and company details and describe the expected output sections. This stays within the stated purpose. Note: the skill expects users to supply potentially sensitive RFP content (normal for this use case).
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is written to disk or downloaded by the skill itself.
Credentials
No required environment variables, credentials, or config paths are declared. Requested inputs are user-provided RFP and company text, which are appropriate for the stated function.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify agent/system configurations. Autonomous invocation is allowed by default (not a concern here).
Assessment
This skill is coherent for drafting proposal responses. Before using it, avoid pasting secrets or credentials into the RFP text (e.g., API keys, private contracts, or personal data). Review any output for accuracy and compliance with your legal/confidentiality requirements. The README links to paid resources — verify those sites separately before entering payment or account details. Because the skill is instruction-only, installing it doesn't add code to your system, but anything you paste into the agent may be transmitted to the model/backend in use — confirm your deployment's data handling policy if you need to protect sensitive information.Like a lobster shell, security has layers — review code before you run it.
biddingvk97cnbqg5v1f98arkmx0eeensx812jbqbusinessvk97cnbqg5v1f98arkmx0eeensx812jbqlatestvk97cnbqg5v1f98arkmx0eeensx812jbqprocurementvk97cnbqg5v1f98arkmx0eeensx812jbqproposalvk97cnbqg5v1f98arkmx0eeensx812jbqrfpvk97cnbqg5v1f98arkmx0eeensx812jbqsalesvk97cnbqg5v1f98arkmx0eeensx812jbq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
