Ai Readiness Checklist
v1.0.0Conducts a 15-question AI readiness assessment, scores key adoption dimensions, and delivers a prioritized, actionable report for enterprise AI deployment.
⭐ 0· 33·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name, description, SKILL.md instructions, and templates consistently implement a 15-question enterprise AI readiness assessment. It does not request unrelated credentials, binaries, or config paths. Minor metadata note: skill.json lists author 'Resomnium' and the report template references resomnium.com, but the registry metadata shows no homepage — this is an administrative inconsistency, not a functional one.
Instruction Scope
The SKILL.md confines the agent to administering questions, recording answers, scoring, and producing recommendations. It does not instruct the agent to read local files, access environment variables, call external endpoints, or exfiltrate data.
Install Mechanism
No install spec and no code files executed at install time (instruction-only). This minimizes disk writes and reduces supply-chain risk.
Credentials
The skill declares no required environment variables, credentials, or config paths — appropriate for a questionnaire/report generator.
Persistence & Privilege
Flags show always:false and normal model invocation allowed. The skill does not request persistent system privileges or attempt to modify other skills or agent-wide config.
Assessment
This skill appears internally consistent and low-risk: it only asks the agent to run a 15-question assessment and produce a report. Before using, consider: (1) You will likely input internal organizational details — avoid pasting sensitive secrets, PII, or regulated data unless you trust where the agent runs and stores logs. (2) The registry metadata lacks a homepage even though the template references resomnium.com; if provenance matters to you, verify the author/source externally. (3) Review any generated report before sharing externally, and ensure use of the skill complies with your internal data-handling and legal policies.Like a lobster shell, security has layers — review code before you run it.
latestvk97b1g5gm9d2vv41b7t5h0e6dn84322d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
