market-structure

v1.0.0

Read and analyze market structure for any trading instrument like a professional trader. Use when the user shares a chart, price data, or asks for a market s...

2· 591·1 current·1 all-time
byDr Om Lakhani@dromlakhani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content: the skill is purely a trading market-structure analyst (SMC/ICT/classical TA). It requires no binaries, credentials, or config paths that would be unrelated to this purpose.
Instruction Scope
SKILL.md contains detailed, prescriptive analysis steps (trend, swings, BOS/CHoCH, order blocks, FVG, bias). It does not instruct the agent to read system files, environment variables, or send data to external endpoints. All instructions stay within the stated trading-analysis scope.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes footprint; nothing is downloaded or written to disk.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate access requested relative to its purpose.
Persistence & Privilege
always is false and the skill does not request persistent system privileges or attempt to modify other skills or global agent settings.
Assessment
This skill is instruction-only and internally consistent with its stated purpose. Before installing, consider: (1) it provides trading methodology, not guaranteed profitable signals — validate outputs with your own analysis and risk management; (2) the agent will need chart images or price data you supply to produce useful results — do not upload sensitive credentials or private account screenshots you don't want shared; (3) do not grant the agent trading-account API keys or automated execution permissions unless you explicitly trust and audit any automation; (4) because the skill encodes a specific methodology (SMC/ICT), check that you want that style of analysis and cross-check with other sources. Overall this appears coherent and low-risk from a security perspective.

Like a lobster shell, security has layers — review code before you run it.

latestvk975qrtxebd4yqf7k4y91j8hzx81e1ze

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments