Financial Analyst

v1.0.0

Financial analysis and research workflows for market research, equity research, comparable companies, precedent transactions, and DCF valuation. Use when ask...

0· 2.4k·26 current·26 all-time
byAleksander Niebylski@aniebyl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (DCF, comps, precedents, market research, memos, PPT/Excel outputs) matches the resources and instructions provided. Templates and reference guides are appropriate for the stated workflows and no unrelated capabilities (cloud, system, or network control) are requested.
Instruction Scope
SKILL.md stays within analyst workflows and points to local template/reference files. It tells the agent to gather data from CSV/Excel/SQL/API/web and to ask users for access details or files — this is expected for data-driven analysis, but it means the agent may prompt users to supply external data or credentials. The instructions do not direct the agent to read system files, export data to third-party endpoints, or perform other out-of-scope actions.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest-risk install mechanism; nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The only credential-like interaction is asking users for access details to their data sources (CSV/Excel/SQL/API/web), which is reasonable for the purpose but should be handled cautiously by the user.
Persistence & Privilege
always is false and the skill does not request special persistence or system-wide configuration. Autonomous invocation is allowed (platform default) but not combined with other concerning privileges or credential access.
Assessment
This skill is coherent and appears to do what it says, but be careful about the data you provide: do not paste or upload full production credentials or secrets. If the agent asks for database/API access, prefer read-only or scoped tokens, temporary credentials, or sanitized exports (CSV/Excel). Review any valuation outputs and formulas before acting on them, and verify cited sources independently. If you must share sensitive files, redact personal or unrelated secrets first.

Like a lobster shell, security has layers — review code before you run it.

latestvk978ytd70p3067gcbfhyxy84xh825hmh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments