Rfp Response Generator
v1.0.0Generate structured, compliant RFP responses by analyzing requirements, mapping company strengths, identifying gaps, and producing tailored proposal sections...
⭐ 0· 118·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (RFP response generation) match the SKILL.md steps: extract requirements, map capabilities, generate sections and a compliance matrix. It does not request unrelated credentials, binaries, or config paths.
Instruction Scope
Instructions are focused on parsing RFPs and company profiles and producing response artifacts. They allow a company profile to be supplied as a file path, which implies the agent may read local files — this is expected for the purpose but worth noting (only provide files you intend the skill to access). The SKILL.md references external rules (SOUL.md §7) that are not included; this is a documentation gap but not a direct security issue.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes on-disk installation risk.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate to the stated purpose of processing documents and company profile data.
Persistence & Privilege
always is false and there is no indication the skill demands persistent system-wide changes or elevated privileges. Agent autonomous invocation is allowed but this is the platform default.
Assessment
This skill appears coherent and low-risk: it only needs the RFP and your company profile to operate. Before using it, do not feed it files containing confidential third‑party data or secrets unless you intend the agent to read them. If you supply the company profile as a local file path, expect the agent to read that file — only provide what is necessary. Verify all generated past-performance and factual claims (the skill explicitly warns not to fabricate, but you should confirm accuracy). Be cautious about sharing sensitive customer or classified information; run a manual compliance/legal review of final proposal text before submission. If you need the referenced SOUL.md rules enforced, request or provide that document so the behavior is fully specified.Like a lobster shell, security has layers — review code before you run it.
latestvk9782zangmda4d5xn7r8xycwes83282k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
