SWOT Analyzer

v1.0.0

Conduct detailed SWOT analyses for businesses or products by evaluating strengths, weaknesses, opportunities, threats, and strategic recommendations based on...

2· 934·7 current·7 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The SKILL.md and README clearly describe a SWOT analyzer and the runtime instructions match that purpose. Minor note: the registry metadata lacks a description and the source/homepage are missing, so provenance is unclear but this does not contradict the skill's functionality.
Instruction Scope
The instructions only ask the agent to gather user-provided context, optionally use web_search when available, build a scored SWOT matrix, and produce recommendations. They do not instruct reading local files, accessing environment variables, or contacting unexpected endpoints.
Install Mechanism
There is no install spec and no code files — this is instruction-only, so nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate to an analysis-only tool.
Persistence & Privilege
always is false and the skill does not request persistent or elevated agent privileges. The skill can be invoked autonomously by the agent (default), which is expected for skills of this type.
Assessment
This skill appears coherent and low-risk: it only asks for business context and (optionally) uses web search. Before installing, consider: 1) the package metadata lacks an external homepage and owner provenance — if that matters to you, try to verify the author or prefer a known source; 2) avoid entering proprietary or secret information into prompts (the skill may include that text in web queries or logs); 3) if your agent's web_search uses external services, verify their privacy policy for any sensitive queries; and 4) test the skill with non-sensitive examples to confirm its behavior before using it on real projects.

Like a lobster shell, security has layers — review code before you run it.

analysisvk97brf346sv718e8dwd53f8041813rfwbusinessvk97brf346sv718e8dwd53f8041813rfwcompetitivevk97brf346sv718e8dwd53f8041813rfwlatestvk97brf346sv718e8dwd53f8041813rfwstrategyvk97brf346sv718e8dwd53f8041813rfwswotvk97brf346sv718e8dwd53f8041813rfw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments