Chief Business Officer

v1.0.0

Drive business growth with partnerships, market expansion, deal-making, and commercial strategy.

6· 1.1k·3 current·3 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the provided content: the SKILL.md and the four supporting docs are business playbooks (partnerships, expansion, deals, revenue). There are no unrelated requirements (no env vars, no binaries, no install).
Instruction Scope
Runtime instructions direct the agent to act as a virtual CBO and to use the included playbooks; they do not instruct reading system files, accessing external endpoints, or exfiltrating data. The guidance is high-level advisory rather than procedural system actions.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest-risk installation model (nothing is written or executed on disk by the skill itself).
Credentials
The skill declares no required environment variables, credentials, or config paths. It may request business metrics or documents during a session (expected for advisory help), but it does not ask for system secrets or unrelated credentials.
Persistence & Privilege
always:false and default invocation settings — no permanent or elevated presence is requested and the skill does not modify other skills or system settings.
Assessment
This skill is a coherent set of business playbooks and looks safe to install from a technical footprint perspective. Before sharing sensitive data with the agent, avoid pasting credentials, raw financial account details, or personally identifiable information; instead provide redacted or summarized metrics (ARR, churn rate, customer concentration percentages). Treat any contract language or negotiation advice as a draft — have legal and finance teams review before executing deals. If the agent asks to connect to external systems or requests tokens/keys, do not provide them unless you explicitly trust and verify that integration.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cw94735p6qv4fe0as2jzk7n813fnh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments