Token Economics Analyzer

v1.0.0

Analyze token types and score tokenomics health to guide acceptance, holding, launching, or rejecting tokens with risk and cost insights.

0· 423·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content: classification, scoring rubric, business decision matrix, red flags, and cost estimates. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
Runtime instructions are prescriptive about how to evaluate tokenomics and what outputs to produce. They do not instruct the agent to read system files, access environment variables, or exfiltrate data. No vague 'gather whatever context you need' language that would grant broad access.
Install Mechanism
Instruction-only skill with no install spec and no code files. Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requires no credentials or environment variables. All guidance and thresholds are internal to the scoring framework and well-aligned with the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent system-level presence or modifications to other skills. It does not request elevated privileges.
Assessment
This skill appears to be a coherent instruction-only advisory tool. Before installing: (1) verify the publisher/source if you want vendor accountability (the homepage is absent), (2) treat cost/legal figures as advisory — consult qualified counsel for binding legal or tax advice, (3) do not grant any trading keys or automation privileges to the agent just because the skill recommends hedging/rebalancing, and (4) exercise caution with the external links and paid 'context packs' (verify URLs and that you trust the vendor before following payment links). If you need higher assurance, ask the publisher for provenance (who authored it, references, or examples of prior analyses) or request a signed source/homepage.

Like a lobster shell, security has layers — review code before you run it.

business strategyvk97ej52xy490nqp7dfa86c8nm981j1s0cryptovk97ej52xy490nqp7dfa86c8nm981j1s0defivk97ej52xy490nqp7dfa86c8nm981j1s0latestvk97ej52xy490nqp7dfa86c8nm981j1s0token economicsvk97ej52xy490nqp7dfa86c8nm981j1s0tokenomicsvk97ej52xy490nqp7dfa86c8nm981j1s0treasuryvk97ej52xy490nqp7dfa86c8nm981j1s0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments