Market Intel Briefing
v0.8.0Build lean, source-linked, decision-ready market intelligence briefs for a niche, competitor set, company set, jurisdiction comparison, or market theme. Use...
⭐ 0· 28·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (market intelligence briefs) match the provided SKILL.md and reference files. No unexpected env vars, binaries, or install actions are requested, and the included references support the claimed functionality.
Instruction Scope
Runtime instructions stay within the brief-writing scope: define scope, prioritize public sources, separate confirmed vs. unverified claims, and apply a 'no-source' gate. The only notable runtime implication is that when users provide no sources the skill instructs the agent to perform public-source synthesis, which presumes the agent has web/browsing access — this is expected for the purpose but worth noting.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes filesystem and network install risk.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no unexplained requests for secrets or unrelated service tokens.
Persistence & Privilege
always is false and disable-model-invocation is default (agent may invoke autonomously). The skill does not request persistent system-wide changes or elevated privileges.
Assessment
This is an instruction-only briefing template that appears internally consistent and requests no credentials or installs. Before using it: (1) Understand the agent will synthesize public sources if you don't supply links — ensure the agent has only the network permissions you intend; (2) Always review briefs before sharing with clients (the skill itself recommends human operator review); (3) Do not paste proprietary or sensitive documents into the prompt unless you intend them to be processed and stored by the agent; (4) If you expect continuous monitoring or access to private data, provision explicit, scoped connectors and validate they are necessary. Overall the skill is coherent for its stated purpose.Like a lobster shell, security has layers — review code before you run it.
latestvk9714xyrccy51wjv6rp213hyt9846e4m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
