Competitive Intelligence

v1.0.0

Generate competitive analysis reports and differentiation talking points based on secondary research

0· 317·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (competitive analysis, differentiation talking points) match the SKILL.md content. The skill declares no binaries, credentials, or install steps — which is proportionate for an instruction-only research/analysis helper.
Instruction Scope
Runtime instructions simply ask the user to paste business context/data and describe expected outputs (reports, scripts, plans). The SKILL.md does not instruct the agent to read local files, environment variables, system paths, or to transmit data to unknown endpoints.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing will be written to disk or downloaded, minimizing install-time risk.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no apparent need for access to external accounts or secrets to perform the stated task.
Persistence & Privilege
always is false and disable-model-invocation is default (agent may invoke autonomously). This is the platform default and is not excessive for a helper skill; the skill does not request permanent presence or modify other skills/configs.
Assessment
This is an instruction-only skill and appears coherent, but exercise normal caution: do not paste sensitive secrets, personally identifiable information, or confidential documents into the input prompt; validate any data-driven recommendations with your own subject-matter experts; verify factual claims and references (LLMs can hallucinate); and if you later need integrations (live data, APIs, or file access), prefer skills that explicitly request only the credentials they need and come from a known source.

Like a lobster shell, security has layers — review code before you run it.

latestvk976m9h3aaqpxpmzhq5ecsv5x983dz3p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments