Olo Market Intelligence

v1.0.0

Competitive landscape and market intelligence for M&A due diligence — TAM/SAM/SOM, competitor mapping, and industry analysis

0· 352·1 current·2 all-time
byAleksander Niebylski@aniebyl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (M&A market intelligence, TAM/SAM/SOM, competitor mapping) matches the SKILL.md tasks (market sizing, competitor profiling, industry analysis). All required data types (revenue, funding, multiples) are appropriate for this purpose.
Instruction Scope
SKILL.md gives bounded, task-focused instructions (how to compute TAM/SAM/SOM, what competitor fields to collect, citation and date-stamping requirements). It does not instruct the agent to read unrelated system files, environment variables, or to exfiltrate data to external endpoints. It assumes access to public/paid data sources, which is consistent with the task.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes on-disk footprint and installation risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. The data it requests (market figures, competitor info) reasonably comes from external data sources and does not require privileged secrets.
Persistence & Privilege
always is false and there are no install hooks or self-modifying instructions. The skill does not request persistent system presence or access to other skills' configs.
Assessment
This skill is an instruction-only template for performing market intelligence and is internally consistent. Before using it, confirm your agent has access to the public/paid data sources you expect (e.g., Gartner, Statista, SEC filings, PitchBook) and ensure licensing/paid-data compliance. Because the skill expects the agent to gather potentially sensitive market or company-specific data, avoid supplying private credentials or confidential target-company documents unless you trust the data-handling policies of the agent environment. Finally, verify citations and date-stamps the skill requires — stale or uncited data can be risky in due diligence contexts.

Like a lobster shell, security has layers — review code before you run it.

latestvk9700ec1ftthc7d75cqwh71zvh825yqb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments