App Review Intelligence

v1.0.0

Analyze app store reviews, cluster pain points, detect trend shifts, and map feedback to prioritized product backlog actions.

0· 92·0 current·0 all-time
byASP@anugotta
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (review clustering, trend detection, backlog mapping) matches the SKILL.md workflow. There are no unexpected env vars, binaries, or config paths required for the described text‑analysis task.
Instruction Scope
The SKILL.md defines a clear analysis workflow (ingest/clean, cluster, score, map) but does not specify how review data is collected. The skill does not instruct reading unrelated system files or credentials, but it assumes review data will be provided or fetched by the agent/environment.
Install Mechanism
No install spec or code files are included (instruction-only), so nothing will be written to disk or downloaded during install.
Credentials
The skill declares no required environment variables or credentials. If you later wire up automatic fetching from App Store / Play Store, those connectors would need their own credentials — but those are not requested by this skill as-is.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent system privileges or modify other skills' configurations.
Assessment
This skill is instruction-only and coherent for reviewing and clustering app feedback. Before installing or using it: (1) decide how review data will be provided — the skill does not include connectors to App Store / Play Store; (2) avoid pasting or storing sensitive credentials in free-form chat — if you add automatic fetchers later, supply minimal, scoped API keys and review their permissions; (3) be mindful of user privacy in reviews (PII) when sending data to any external service; (4) because it’s an instruction-only skill, it won’t install binaries, but an autonomous agent could try to fetch data if granted network/credential access — monitor agent actions when you first run it.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a7bg1bjz11axgybarnmvb19837pzf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📈 Clawdis

Comments