YC New Way
v0.1.0Apply Y Combinator’s “New Way to Build a Startup” playbook to ship fast, validate with real distribution, and iterate using data. Use when the user asks to f...
⭐ 1· 438·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (YC New Way playbook → ship, distribute, learn) align with the included templates and step-by-step instructions. The skill does not request unrelated capabilities (no cloud creds, no unusual binaries).
Instruction Scope
SKILL.md and the reference templates stay within the playbook: clarifying hypothesis, picking a wedge, choosing distribution, minimal MVP, metrics, and weekly loop. There are no instructions to read local files, access environment variables, or call hidden endpoints. Guardrails explicitly discourage bypassing logins/CAPTCHAs and request evidence-first sourcing.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk and no external archives are downloaded.
Credentials
The skill requires no environment variables, credentials, or config paths. All required inputs are user-provided planning details and publicly-citable evidence — proportional to the stated purpose.
Persistence & Privilege
always:false and model invocation is enabled (default). The skill does not request permanent presence or modify other skills or system settings.
Assessment
This skill is internally consistent and low-risk because it is instruction-only and asks for no secrets or installs. Before installing, consider: (1) limit the agent's network permissions if you don't want it performing live web scraping or publishing on your behalf; (2) follow the skill's own guardrail to avoid scraping behind logins or bypassing CAPTCHAs and respect Terms of Service; (3) when you track analytics or paste dashboard URLs, prefer trusted analytics providers and avoid sharing sensitive user data; and (4) review any outputs before using them as copy or publishing to ensure evidence links are accurate and no unintended PII is exposed.Like a lobster shell, security has layers — review code before you run it.
latestvk97480j8kax17615sdcp1za59n81p64pproductvk97480j8kax17615sdcp1za59n81p64pstartupvk97480j8kax17615sdcp1za59n81p64pvalidationvk97480j8kax17615sdcp1za59n81p64p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
