Market Research
v1.0.1Research markets with sizing, segmentation, competitor mapping, pricing checks, and demand validation that turn fuzzy ideas into decision-ready evidence. Use...
⭐ 69· 16.4k·172 current·184 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and delivered files (competitor-analysis, validation, evidence-grading) align with market research tasks (sizing, segmentation, competitor mapping, pricing checks). Nothing in the metadata or manifests asks for unrelated resources (no binaries, env vars, or config paths).
Instruction Scope
SKILL.md and supporting files instruct the agent to gather public market evidence (public filings, review sites, job posts, interviews, surveys) and to avoid unethical collection methods. The instructions do not tell the agent to read local files, harvest environment variables, or post data to unexpected endpoints. They do propose outreach activities (cold outreach, interviews) which correctly require explicit user consent in practice.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is downloaded or written to disk. This is the lowest-risk install model.
Credentials
The skill declares no required environment variables, credentials, or config paths. All recommended data sources are public. There are no unexplained secrets requested.
Persistence & Privilege
always is false and disable-model-invocation is false (normal). The skill does not request permanent presence or system-wide configuration changes.
Assessment
This is a coherent, instruction-only market research playbook. Before using it, remember: (1) the agent will need internet access or connector permissions to fetch public data — ensure you trust which browsing/data connectors are enabled; (2) the skill suggests outreach (cold outreach, interviews) — do not let it contact people on your behalf without explicit approval; (3) never paste private credentials, proprietary internal docs, or non-public data into prompts unless you intend those to be used; and (4) verify data sources and assumptions the skill reports (it recommends citing methods and confidence levels). If you need automation that scrapes paywalled sources or performs actions on behalf of you, require explicit, narrow permissions and audit logs.Like a lobster shell, security has layers — review code before you run it.
latestvk97dcssfwtrntz6q4pky94ny2x82pbag
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
OSLinux · macOS · Windows
