Competitor Message Differ

v1.0.0

比较竞品在信息架构和叙事上的差异,找出可借鉴点与应避免模仿点。;use for competitor, messaging, positioning workflows;do not use for 抄袭竞品文案, 编造竞品数据.

0· 137·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (compare competitor messaging) align with included resources: a template, spec, examples, and a Python script that builds structured reports and audits directories/files. Requiring only python3 is proportionate.
Instruction Scope
SKILL.md instructs the agent to use the bundled script or fall back to the template. The script can read files and directories provided via --input and will scan file contents (including .md, .py, .sh, .json, .csv, etc.) and produce reports. This is expected for an audit/analysis tool, but it means the skill will read arbitrary user-specified local files and could include sensitive content in its outputs if those files are pointed at. The skill does not instruct network calls or hidden data exfiltration.
Install Mechanism
No install spec is provided (instruction-only). The only runtime requirement is python3 and the bundle includes a local script. No downloads, package installs, or external URLs are used.
Credentials
No environment variables, credentials, or config paths are requested. All processing is local and driven by user-provided inputs.
Persistence & Privilege
Skill is not marked always:true and does not request persistent platform privileges. It does not modify other skills or system-wide settings.
Assessment
This skill appears to do what it says: locally analyze competitor text and produce structured findings. Before running: do not point the script at system, home, or other directories that may contain secrets or unrelated private files (e.g., ~/.ssh, /etc, project folders with credentials). Prefer providing sanitized examples or a curated directory of competitor materials. Use --dry-run or run against examples first. Review any generated output before sharing externally. There is no network exfiltration in the code, but the script will include text from files you give it in its output, so treat inputs as potentially sensitive.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cg65ehbcs12bfvxatcrfm0x8305yp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🆚 Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments