Client Proposal Generator Lite

v1.0.0

Free version — generate a proposal executive summary and scope outline from a project brief.

0· 32·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and runtime instructions all describe generating an executive summary and scope outline from a project brief. The skill declares no binaries, env vars, or config paths, and nothing in SKILL.md requires anything beyond the user-provided inputs (client name, project type, deliverables, rate).
Instruction Scope
SKILL.md provides a bounded recipe for producing a 1-page executive summary and a high-level scope outline. It does not instruct the agent to read files, access environment variables, call external APIs, exfiltrate data, or perform system operations. The document contains promotional links to a paid product, but those are informational only.
Install Mechanism
No install spec and no code files — this is instruction-only, which minimizes on-disk/executable risk.
Credentials
The skill requires no environment variables, credentials, or config paths. The requested inputs (client name, project type, deliverables, rate) are appropriate and minimal for the stated purpose.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or attempt to modify other skills or system settings. Default autonomous invocation is allowed but not unusual and does not combine with other red flags here.
Assessment
This skill is instruction-only and appears coherent with its description. Before using it, avoid pasting sensitive or proprietary information (client PII, secrets, or contract terms) into the prompt. Note the SKILL.md includes a third-party paid link (Gumroad) — if you choose to purchase, review that vendor separately. Because there is no code to inspect, the attack surface is small, but also there is no guarantee beyond the text: if you need to handle confidential client data, prefer redacting sensitive details or using an approved internal tool that you control.

Like a lobster shell, security has layers — review code before you run it.

claude-skillsvk974fzr1eca6cttrbs1w22205s842j5yclient-managementvk974fzr1eca6cttrbs1w22205s842j5yconsultingvk974fzr1eca6cttrbs1w22205s842j5yfreelancervk974fzr1eca6cttrbs1w22205s842j5ylatestvk974fzr1eca6cttrbs1w22205s842j5yproposalsvk974fzr1eca6cttrbs1w22205s842j5ysowvk974fzr1eca6cttrbs1w22205s842j5y

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments