Gerador Receitas
v1.0.0Análise de métricas SaaS para planejamento de monetização: ARR, NDR, LTV:CAC, Magic Number, cohort analysis, GTM efficiency. Tudo em português para a comunid...
⭐ 0· 96·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions focus on SaaS revenue metrics (ARR, NDR, LTV:CAC, Magic Number, cohorts, GTM). The skill requests no binaries, env vars, or config paths — which is appropriate for a calculation/reporting helper. Minor metadata mismatch: registry metadata reported no homepage but clawhub.json lists a GitHub homepage/support URL; this is an administrative inconsistency, not a security issue.
Instruction Scope
SKILL.md only instructs the agent to compute metrics, produce projections and suggest improvements. It does not ask the agent to read system files, access environment variables, or transmit data to external endpoints beyond normal agent responses.
Install Mechanism
No install spec and no code files are included (instruction-only). That minimizes disk writes and network installs; nothing is downloaded or executed.
Credentials
The skill declares no required environment variables or credentials. This is proportional to its stated purpose. There are no hidden credential requests in SKILL.md.
Persistence & Privilege
always is false and model invocation is allowed (defaults). The skill does not request permanent presence or modify other skills/config; privileges are typical and limited.
Assessment
This skill appears coherent and low-risk, but do these checks before installing: (1) prefer installing from a known repository (clawhub.json points to a GitHub URL — review that repo to confirm contents); (2) never paste real secrets, billing credentials, or production CSVs into prompts when asking for analysis; (3) verify the exact formulas and definitions the skill uses (e.g., Magic Number and NDR variants) match your accounting conventions before acting on recommendations; (4) if you plan to feed real customer or revenue data, limit scope and sanitize personally identifiable or sensitive billing information.Like a lobster shell, security has layers — review code before you run it.
latestvk976w6srjp30bv5qj6axa52r6d83b2r9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
