startup-risk-radar

v1.0.0

Evaluate startup ideas, business models, and product strategies against the 7 deadly failure antipatterns extracted from 1,749 dead startups that burned $535...

0· 159·0 current·0 all-time
byConn Ho@conn-ho
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (startup risk assessment) aligns with the provided SKILL.md and reference documents. There are no unexpected environment variables, binaries, or config paths required that would be inconsistent with the stated purpose.
Instruction Scope
Runtime instructions are self-contained: read the included reference files, score the seven antipatterns, produce a structured report. The instructions do not direct the agent to read unrelated system files, exfiltrate data, call external endpoints, or access secrets.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is downloaded or written to disk by an installer, which is the lowest-risk installation model.
Credentials
The skill declares no required environment variables, credentials, or config paths. The assessment questions and outputs don't rely on any external secrets, so requested access is proportionate.
Persistence & Privilege
always is false and the skill is user-invocable (normal). It does not request persistent system-level privileges or modify other skills' configuration.
Assessment
This skill appears internally consistent and low-risk, but consider the following before installing: 1) provenance — the skill claims a dataset (loot-drop.io) but has no homepage or verifiable source; verify the underlying data or citations if you rely on the assessments. 2) accuracy scope — the tool is advisory (product/market/legal/financial implications may require domain experts); do not treat outputs as legal or financial advice. 3) data handling — avoid pasting sensitive or proprietary customer data into prompts when testing. 4) test with non-sensitive sample ideas to verify output style and validity before using on real projects. If you need higher assurance, ask the publisher for a source/replication of the 1,749-case dataset or a homepage/references for the dataset.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fvk73jt55d65hec1qas1cv182t8w5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments