Map

v1.0.0

Turn complex business goals into navigable strategic maps. Identify milestones, resource nodes, risk points, bottlenecks, and route logic so users can see th...

0· 300·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, declared capabilities and the SKILL.md all describe the same activity (turning goals into logic/route maps). There are no unrelated requirements (no env vars, no binaries). Minor note: skill.json lists a homepage (https://clawhub.ai) while registry metadata showed 'none' — this is a small provenance/metadata inconsistency but does not affect capability alignment.
Instruction Scope
SKILL.md contains detailed, scoped instructions for parsing goals, mapping dependencies, surfacing risks, and returning a structured assessment. It does not instruct the agent to read system files, access environment variables, call external endpoints, or perform actions outside the planning/analysis domain.
Install Mechanism
There is no install spec and no code files that would be executed. Being instruction-only means the skill does not write code to disk or run remote installs — lowest-risk install profile.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. The instructions do not reference secrets or external credentials. The requested privileges are proportionate to an analysis/mapping skill.
Persistence & Privilege
Flags show always:false and standard autonomous invocation allowed (the platform default). The skill does not request persistent presence, nor does it modify other skills or system configs in its instructions.
Assessment
This skill appears internally consistent and low-risk: it only provides structured strategic analysis and asks for no credentials or installs. Before using it, avoid pasting sensitive secrets or confidential documents into prompts, validate any high-stakes recommendations with domain experts (legal, financial, operational), and consider testing with non-sensitive example goals first. Also note the publisher is unknown in the registry metadata (and there is a small homepage metadata mismatch); if provenance matters for your organization, verify the author/source before wide deployment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97avr4tj8kek2rbrcvzz063v182nn6n

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments