Business Process Audit
v1.0.0Evaluates business workflows across 8 areas to identify automation opportunities, estimate time and cost savings, and prioritize processes by ROI for digital...
⭐ 0· 630·5 current·5 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md instructions: it guides an agent to ask about a business, analyze eight process areas, estimate time/cost savings, and prioritize automation by ROI. No unrelated capabilities, binaries, or credentials are requested.
Instruction Scope
Instructions are scoped to conversational assessment and producing a structured audit. They say to 'ask the user about their business (or infer from context)'; this is reasonable for a conversational auditor but could be interpreted broadly by an agent. There are no directives to read files, call external endpoints, or access environment variables.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes disk writes and reduces code-execution risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. Its stated calculations use public assumptions (salary/hour estimates) that don't require secrets.
Persistence & Privilege
always is false and there is no indication the skill modifies agent/system settings or requires permanent presence. The skill allows normal autonomous invocation (platform default), which is expected for conversational skills.
Assessment
This skill appears coherent and low-risk: it's a prompt-driven audit template with no installs or credentials. Before using, avoid pasting sensitive credentials or private documents into the chat — provide only the business details needed (process descriptions, tools in use, volumes, and approximate hourly costs). If you plan to run the audit against systems or upload internal documents, review outputs for accuracy and do not share secrets. If you want stricter data handling, require the agent not to 'infer from context' or disable autonomous invocation when installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97dkpsqd406z5wpfyxdqwbb9x81m0f7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
