Data Analysis

v1.0.2

Data analysis and visualization. Query databases, generate reports, automate spreadsheets, and turn raw data into clear, actionable insights. Use when (1) yo...

82· 24.5k·299 current·313 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (data analysis, visualization, SQL/Python/spreadsheets guidance) match the included SKILL.md and supporting documents. The skill requests no binaries, env vars, or config paths—consistent with a purely advisory/reference skill.
Instruction Scope
SKILL.md contains methodology, checklists, and references to bundled docs (chart-selection.md, techniques.md, etc.). It does not instruct the agent to read system files, access credentials, call external endpoints, or persist state. All runtime guidance is limited to analytical process and output formatting.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing will be downloaded or written to disk during install, which is low-risk and proportional to the skill's purpose.
Credentials
The skill declares no required environment variables, no credentials, and no configuration paths. This is appropriate for a documentation/methodology skill that doesn't integrate directly with external services.
Persistence & Privilege
always is false and the skill is user-invocable. disable-model-invocation is false (allowing autonomous invocation), which is the platform default; given the skill has no external access or credentials, this does not materially increase risk here.
Assessment
This skill is a packaged set of best-practice instructions and templates for analysis and visualization — it does not itself connect to data sources or request credentials. Before using it in a context where you provide data or grant access, verify any connectors or tools you (or the agent) use to run queries: only give database or spreadsheet credentials to trusted tools and avoid pasting sensitive data into free-text prompts. Treat the outputs as methodological guidance (review results, check metric contracts, and confirm owners) rather than an authoritative automated action.

Like a lobster shell, security has layers — review code before you run it.

latestvk978epq2kkmk6ahsr8g3fhz4w582qspx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

D Clawdis
OSLinux · macOS · Windows

Comments