Market Analysis Cn
v1.0.1市场分析服务 | Market Analysis Service. 企业市场趋势分析 | Enterprise market trend analysis. 竞品分析 | Competitor analysis. 用户行为洞察 | User behavior insights. 触发词:市场分析、竞品分析、mar...
⭐ 0· 143·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description promise market/competitor/user analysis. The package contains only descriptive files (SKILL.md, package.json, _meta.json) and declares no binaries, env vars, or installs — which is coherent for an instruction-only, consultancy-style skill.
Instruction Scope
SKILL.md is high-level and reads like a service listing (services, prices, and a sample POST payload). It does not contain runtime commands, host endpoints, or instructions to read files or environment variables. Note: the README is vague about where analysis runs and how payments are handled — the sample API call lacks a host, and the skill may prompt users to supply their data for analysis (which is expected for this kind of service).
Install Mechanism
No install spec, no downloads, and no code files to execute. This is the lowest-risk category for install behavior.
Credentials
The skill declares no required environment variables, credentials, or config paths. Nothing requests unrelated secrets or system access.
Persistence & Privilege
Flags show default behavior (not always, user-invocable, autonomous invocation allowed). There is no request for permanent presence or modification of other skills or system settings.
Assessment
This skill is essentially a sales/service description rather than an executable integration: it contains no code, does not request credentials, and will not run anything by itself. Before paying or sharing data, verify the provider (author/owner) and ask where analysis runs and how payments and your data are handled. Do not transmit sensitive credentials or proprietary data until you confirm a secure payment and data-handling process (privacy policy, endpoint URL, and identity of the service operator). If you want automated on-platform analysis, prefer skills that include transparent integration details or published endpoints and provenance.Like a lobster shell, security has layers — review code before you run it.
latestvk977vnadgqd29q7qr75fgbvqd183hxm4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
