Mit24 Value Proposition
v1.0.0MIT有序创业24步法第二阶段(步骤6-10)。当用户需要设计价值主张、构建商业模式画布、量化产品价值、寻找潜在客户、定义核心价值时使用。触发词:价值主张、商业模式、商业模式画布、Business Model Canvas、全生命周期使用案例、客户终身价值、CLV、潜在客户、核心价值、价值量化、ROI
⭐ 0· 70·0 current·0 all-time
byRoma@earthwalking
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, and SKILL.md all focus on designing value propositions, quantifying value, customer interviews, and building a Business Model Canvas. There are no unrelated requirements (no env vars, binaries, or config paths), so requested capabilities match the stated purpose.
Instruction Scope
The runtime instructions are procedural guidance (steps 6–10) and specify expected outputs. They do not instruct the agent to read local files, access environment variables, or transmit data to external endpoints. The instructions ask the agent to produce reports and lists but do not request system-level access or credential use.
Install Mechanism
No install spec or code files are present; this is instruction-only. That minimizes the skill's ability to drop or execute code on the host.
Credentials
The skill declares no required environment variables, credentials, or config paths. Everything it asks the user to provide (customer lists, interview notes, numeric values) is proportional to the business-design task.
Persistence & Privilege
always:false and no install actions are set. The skill may be invoked autonomously by the agent (platform default), which is expected for a user-invocable skill; this is not combined with elevated privileges or broad environment access.
Assessment
This skill appears coherent and low-risk because it is instruction-only and asks for no system access. Before using it: (1) avoid pasting sensitive or personally identifiable information—when providing customer lists or interview transcripts, anonymize or redact PII; (2) do not paste proprietary financials or private credentials—the skill does not need secrets to function; (3) validate any numeric or market claims the skill produces (use as advisory input, not authoritative); and (4) note the publisher/source is unknown—if you require provenance, ask the publisher or prefer skills with a verifiable homepage or trusted owner. If you plan to run customer outreach suggested by the skill, obtain consent and follow applicable privacy rules.Like a lobster shell, security has layers — review code before you run it.
latestvk978gg9gjf4w48ae7rsfn808jx8419t1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
