Professional Stock Analysis Agent

v1.0.0

Professional stock analysis agent with strong capabilities in analyzing US, Hong Kong, and A-share markets. Provides stock recommendations based on market de...

1· 981·8 current·8 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (professional stock analysis for US/HK/A-share) aligns with the provided instructions and reference documents; no unrelated credentials, binaries, or capabilities are requested.
Instruction Scope
SKILL.md and reference files contain only analysis frameworks, checklists, valuation methods and market characteristics; there are no instructions to read local files, access environment variables, call external endpoints, or transmit data.
Install Mechanism
No install spec and no code files (instruction-only). This minimizes disk writes and arbitrary code execution risk.
Credentials
No required environment variables, credentials, or config paths are declared; the analysis content doesn't require secrets or external service tokens.
Persistence & Privilege
always is false and the skill does not request persistent system-level privileges or modification of other skills; autonomous invocation is allowed by default but is not combined with any other elevated access.
Assessment
This skill is internally consistent and appears to be an instruction-only stock analysis framework. Before installing, remember: (1) it is not a substitute for licensed financial advice and may make factual errors — verify any trade ideas independently; (2) because it’s instruction-only there are no hidden network calls or credentials in the package, but you should confirm the agent’s runtime environment (the host application) does not add connectors that could execute trades or exfiltrate data; (3) if you plan to use real account data or wire it to broker APIs, require explicit, separate credentials and review those integrations carefully; (4) monitor outputs for hallucinations and place operational controls (approval steps) before acting on recommendations.

Like a lobster shell, security has layers — review code before you run it.

latestvk973e7zcdkfvagvzs22hyvh8n983a79d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments