Company
v1.0.0Build an agent-powered organization by mapping functions to skills and iterating on structure.
⭐ 4· 727·1 current·1 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (build agent-powered org) align with the provided guidance and templates. The skill requires no binaries, env vars, or installs that would be unrelated to its purpose.
Instruction Scope
SKILL.md, functions.md, iteration.md, and patterns.md contain process guidance, question templates, mapping heuristics, and iteration protocols. They do not instruct the agent to read local files, access credentials, call external endpoints, or perform actions outside the stated organizational-design scope.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths — appropriate for a methodology/consulting-style skill that provides process guidance only.
Persistence & Privilege
Skill is not forced-activated (always:false) and does not request elevated persistence or modification of other skills/configurations. It allows normal autonomous invocation, which is the platform default and acceptable here.
Assessment
This skill is coherent and appears safe as a set of operational guidelines for building agent-driven orgs. Before applying its recommendations in production, do the following: (1) Pilot automation on low-risk internal functions (as the documents themselves recommend) and keep humans in the loop; (2) When the skill advises 'install existing skill' or 'create custom skill', review any third-party integrations' permissions and credentials carefully—grant least privilege and audit access; (3) Treat legal, compliance, finance, and customer-impacting decisions as human-reviewed per the skill's own red flags; (4) Maintain logs, versioned operational memory, and rollback triggers as described; (5) If you later implement custom code or integrations based on these templates, have those code/install artifacts reviewed separately (this evaluation covers only the instruction-only skill).Like a lobster shell, security has layers — review code before you run it.
latestvk978sh62ppf3p7tdkgwaf62dfd810bw6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
