Mit24 Market Entry
v1.0.0MIT有序创业24步法第四阶段(步骤15-18)。当用户需要计算获客成本CAC、设计销售流程、识别和测试商业假设、制定市场进入策略时使用。触发词:获客成本、CAC、销售流程、销售漏斗、商业假设、假设验证、MVP测试、Landing Page、A/B测试、市场进入、GTM、Go-to-Market、客户开发
⭐ 0· 41·0 current·0 all-time
byRoma@earthwalking
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md content (market entry, CAC, sales process, hypothesis testing). There are no unexpected required binaries, env vars, or config paths.
Instruction Scope
SKILL.md contains only procedural guidance (formulas, frameworks, outputs to produce). It does not instruct the agent to read system files, access credentials, or call external endpoints. It does mention using the user's existing operational data if available — which is reasonable for this domain but requires user consent.
Install Mechanism
No install spec and no code files (instruction-only). Nothing will be written to disk or downloaded as part of the skill package.
Credentials
The skill declares no environment variables, credentials, or config paths. It does not request access to unrelated services or secrets.
Persistence & Privilege
always is false and the skill is user-invocable (normal). It does not request permanent presence or modify other skills or system settings.
Assessment
This skill is a coherent, instruction-only market-entry helper. Before using it, consider: (1) the skill may ask you to paste or provide your business/operational data — avoid sharing credentials or sensitive PII; use anonymized or mock data if you want to test it first; (2) the skill is authored by an unknown source and has no homepage, so treat its strategic/financial outputs as guidance rather than authoritative advice — validate calculations (CAC, CLV) and decisions with your own data and advisors; (3) because it can be invoked autonomously by the agent (the platform default), monitor what data you send to the agent and revoke access if the agent begins requesting unnecessary information.Like a lobster shell, security has layers — review code before you run it.
latestvk976qff3vm9pb2p5akb18ybt8h84176q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
