CSO / Chief Strategy Officer

v1.0.2

Lead strategy with competitive analysis, strategic planning, growth roadmaps, and business portfolio management.

2· 1.4k·9 current·9 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (CSO-level strategy, competitive analysis, planning, growth) align with the included markdown files (planning, competitive, growth, corporate-dev, audits, incidents, vendors, etc.). There are no unrelated dependencies, binaries, or environment variables requested.
Instruction Scope
SKILL.md and the companion docs are advisory: checklists, frameworks, and playbooks. The runtime instructions do not tell the agent to read system files, access environment variables, or send data to external endpoints. Human-in-the-loop guidance is explicit for high-impact decisions (M&A, pivots).
Install Mechanism
No install spec or executable code is included; this is instruction-only so nothing is downloaded or written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested. The content references standard operational practices (rotate leaked credentials, scan git history) but does not ask the agent to access secrets or external credentials.
Persistence & Privilege
The skill does not request always:true, does not modify other skills' configs, and does not require persistent system presence. Model invocation is enabled (platform default) but that is expected and not combined here with other red flags.
Assessment
This skill is a documentation-only CSO playbook and appears internally consistent. Before installing or using it: (1) confirm the publisher/reputation (verify the homepage and owner) if you require provenance; (2) never paste production credentials or secrets into chats prompted by the skill — the docs advise rotating leaked credentials but the skill itself does not need secrets; (3) treat any high-impact recommendations (M&A targets, major pivots, legal/compliance actions) as advisory and validate with human experts; (4) if you install related skills suggested by this one, check each related skill for its own permissions and install behavior.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ejy3csmkbj4n4a3zmqys1fd81hc7d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🎯 Clawdis
OSLinux · macOS · Windows

Comments