Banking

v1.0.0

Manage retail and business banking workflows with payment operations, account controls, reconciliation, fraud response, and compliant communication.

0· 423·3 current·3 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (banking operations, incident response, communications) match what the skill requests and instructs: a local memory/config path (~/banking/) and structured guidance files. No unrelated binaries, cloud credentials, or network integrations are requested.
Instruction Scope
SKILL.md and the included docs confine activity to guidance and local notes in ~/banking/ (memory, incidents, controls, messaging). Instructions explicitly forbid storing full account numbers/authentication and disallow network calls. This is coherent; note that enforcement depends on the agent/runtime following the guidance.
Install Mechanism
No install spec and no code files — instruction-only — so nothing is downloaded or written to disk by an installer. Lowest-risk install profile.
Credentials
The skill declares only a config path (~/banking/) and no environment variables or credentials. That is proportionate for a workflow/reference skill that does not itself access bank APIs or execute transfers.
Persistence & Privilege
The skill persists local state in ~/banking/, which is reasonable for incident history and templates. It is not always-enabled and does not request elevated system-wide privileges. Caveat: because it writes persistent notes about banking incidents, the user should control filesystem permissions and be careful what sensitive data is saved — the skill's guidance attempts to limit sensitive storage but cannot enforce it itself.
Assessment
This skill is internally coherent and appears to be a local-playbook for banking operations. Before installing or using it with real cases: (1) Restrict the filesystem permissions on ~/banking/ so only authorized agents/users can read it; (2) enforce your own rules to never store full account numbers, credentials, or other PII in that folder; (3) confirm that other installed skills or the agent runtime do not have network access or credentials that could cause data in ~/banking/ to be exfiltrated; (4) consider testing with dummy data first; and (5) if you expect the agent to perform real transfers or access bank portals, choose a different skill that explicitly requests the necessary credentials and integrations.

Like a lobster shell, security has layers — review code before you run it.

latestvk974wxsq5g5k1ybz9680mp1qn1820kcy

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

B Clawdis
OSmacOS · Linux · Windows
Config~/banking/

Comments