Renewal Risk Monitor
v1.0.0识别续约风险信号,区分可挽回风险与高概率流失信号。;use for renewal, risk, customer-success workflows;do not use for 伪造健康度数据, 替代正式续约决策.
⭐ 0· 70·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (renewal risk detection, structured brief output) match the included templates and scripts. The included Python script provides structured summarization and also supports directory/csv/pattern/skill audits — a broader capability than the minimal summary described in spec.json, but still coherent for audit/review workflows.
Instruction Scope
SKILL.md instructs the agent to either (a) run the local script with python3 or (b) generate output using bundled templates. The instructions do not ask the agent to access unrelated system credentials or remote endpoints. However, the script will recursively read many file types under any directory provided as input (markdown, json, py, sh, csv, etc.), so if the agent is pointed at a broad filesystem path it can surface arbitrary local files (including sensitive configs) in its output. SKILL.md does state '仅使用本地输入内容' and '默认只读', but operators must ensure the provided input path is limited to intended data.
Install Mechanism
No install spec; the skill is instruction-only plus a local Python script. It only requires python3 and uses the standard library. No downloads or external installers are invoked.
Credentials
No environment variables, credentials, or config paths are requested. The script operates on user-supplied input files/directories. This is proportionate for a local auditing/reporting skill.
Persistence & Privilege
always:false and normal autonomous invocation settings. The skill does not request permanent platform-level privileges and does not alter other skills' configuration. It may write an output file if the operator allows it (standard behavior).
Assessment
This skill appears to do what it says: produce structured renewal-risk briefing and local audits. Before running it, point --input at only the files or directory you intend it to analyze (avoid passing root, home, /etc, or other system-wide locations). Use --dry-run first and review output before sharing externally — the script reads many text/code file types and can surface sensitive content if given broad inputs. No credentials or network calls are required by the bundle, but exercise normal caution about the data you feed it and where you save outputs.Like a lobster shell, security has layers — review code before you run it.
latestvk97ddbfp1zygwnmy2e5601ayqh83e4jp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📉 Clawdis
OSmacOS · Linux · Windows
Binspython3
