Change Management
v2.1.1Framework for rolling out organizational changes without chaos. Covers the ADKAR model adapted for startups, communication templates, resistance patterns, an...
⭐ 0· 304·2 current·2 all-time
byAlireza Rezvani@alirezarezvani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description match the files: SKILL.md and a reference playbook containing ADKAR guidance, templates, timelines and scripts. There are no unexpected binaries, env vars, or configuration paths required.
Instruction Scope
The runtime instructions are documentation and usage guidance (when to use the playbook and what to recommend). They do not direct the agent to read system files, access environment variables, call external endpoints, or exfiltrate data.
Install Mechanism
No install specification and no code files — instruction-only. This minimizes on-disk execution risk and there are no download/extract steps to review.
Credentials
The skill declares no required environment variables, credentials, or config paths. Requested privileges are proportionate (none) to the stated documentation purpose.
Persistence & Privilege
always is false and the skill is user-invocable; model invocation is allowed (platform default) but the skill has no autonomous side effects, persisting state, or cross-skill configuration changes.
Assessment
This skill is essentially a documentation/template bundle for running organizational changes — it does not install code or ask for credentials, so the technical risk is low. Before installing, consider: (1) review the wording of any communications the agent will draft to ensure they don't accidentally include sensitive or legally risky details; (2) validate HR/legal guidance for layoffs/reorgs before sending; and (3) remember that the playbook is generic — adapt timelines, escalation paths, and enforcement language to your company's policies and local laws.Like a lobster shell, security has layers — review code before you run it.
latestvk976p7e15z8a3p47952f2f9mj182mabn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
