DELLIGHT Strategic Intelligence

v1.0.0

Automation skill for DELLIGHT Strategic Intelligence.

0· 726·1 current·1 all-time
byDELLIGHT@arthurelgindell
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (CIO Intelligence for competitive/strategic analysis) matches the SKILL.md content: templates, prioritization, and step-by-step analysis guidance. The skill declares no binaries, no env vars, and no config paths — all proportional to a documentation/template-oriented skill.
Instruction Scope
SKILL.md contains high-level operational instructions (gather, analyze, assess, recommend, monitor). It does not instruct the agent to read local files, access environment variables, or call external endpoints directly. The guidance is intentionally broad about 'collect relevant data from provided sources' — reasonable for this purpose but somewhat vague about where data should come from (user-provided vs. fetched autonomously).
Install Mechanism
No install spec and no code files: lowest-risk model (nothing written to disk or downloaded).
Credentials
No required environment variables, credentials, or config paths are declared. Nothing requests access to unrelated services or secrets.
Persistence & Privilege
Skill is user-invocable and not always-on. Autonomous invocation is allowed by default (platform behavior) but the skill itself does not request elevated/persistent privileges or to modify other skills or system settings.
Assessment
This skill is a pure guidance/template document and looks internally consistent. Before installing or using it: (1) confirm how the agent will obtain 'provided sources' — prefer you (the user) to supply data rather than allowing the agent to autonavigate the web; (2) if you later see the skill updated to include an install step, external URLs, or required credentials, stop and re-evaluate; (3) monitor the agent's actions when you first invoke the skill (network calls, file reads) and restrict agent/network permissions if you want to limit data fetching. If you want stronger safeguards, require explicit user consent before the agent fetches external data or performing actions beyond producing analysis text.

Like a lobster shell, security has layers — review code before you run it.

c-suitevk979px5sphtz7qvn6mhdmhs6c5815082dellightvk979px5sphtz7qvn6mhdmhs6c5815082intelligencevk979px5sphtz7qvn6mhdmhs6c5815082latestvk979px5sphtz7qvn6mhdmhs6c5815082

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments