Marketing Scenario Simulator
v1.1.0Marketing strategy simulation with multi-agent analysis. Use when evaluating marketing strategies, product launches, campaigns, or needing diverse perspectiv...
⭐ 0· 132·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (marketing scenario simulation) align with the instructions: spawning five specialized agents sequentially and synthesizing results. There are no unrelated env vars, binaries, or installs requested.
Instruction Scope
All runtime steps are limited to spawning and collecting results from subagents (sessions_spawn, subagents list) and synthesizing their outputs. This stays within the stated purpose. Note: the skill grants the agent authority to create and coordinate multiple subagents, which increases the scope of model activity but is coherent with a multi-agent simulator.
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing is written to disk or downloaded.
Credentials
No environment variables, credentials, or config paths are requested, which is proportionate to a simulation that runs purely via agent sessions.
Persistence & Privilege
always:false (no forced inclusion). The skill relies on normal autonomous invocation of subagents (platform default). There is no request to modify other skills or system-wide config.
Assessment
This skill appears coherent with its stated purpose and asks for no credentials or installs. Two practical cautions: (1) provenance: the skill has no homepage and an unknown source — if you need trust guarantees, ask the publisher for more metadata or test on non-sensitive scenarios first. (2) operational scope: it spawns five subagents sequentially, so any sensitive input you provide will be replicated into those subagent runs; avoid submitting private secrets or confidential data into the simulation. If you plan to run it in production, test with mock data and confirm the platform's subagent logging/retention policies.Like a lobster shell, security has layers — review code before you run it.
latestvk97cpgyczmx4deweezyp1npx5s833fm6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
