Financial Model Builder

v1.0.0

Build revenue models, pricing tools, and forecasting spreadsheets with assumptions, scenarios, and projections. Use when creating financial forecasts, unit e...

0· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (financial models, DCF, LBO, SaaS metrics) align with the SKILL.md content; required resources are nil and consistent with an instruction-only Excel model builder.
Instruction Scope
Runtime instructions describe building workbook tabs, formulas, scenario toggles, and an output .xlsx with a README tab. There are no instructions to read system files, access environment variables, call external endpoints, or collect unrelated data.
Install Mechanism
No install spec and no code files; nothing is written to disk by an installer. This is the lowest-risk model for a skill that only provides authoring guidance for spreadsheets.
Credentials
The skill declares no required environment variables, credentials, or config paths. The guidance expects user-provided inputs for modeling assumptions but does not ask for secrets or unrelated service credentials.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skills. Autonomous invocation is allowed (platform default) but not combined with other privilege concerns.
Assessment
This skill appears coherent and low-risk: it only provides detailed instructions for building Excel financial models and requests no installs or credentials. Before using, avoid entering sensitive secrets (bank logins, API keys) into model inputs, test the skill with non-sensitive sample data, and review generated .xlsx files (including any macros or external links) before sharing. If the skill later asks for file-system access, cloud credentials, or to download/run external code, treat that as a red flag and stop. If you need higher assurance, ask the publisher for a source/homepage or an implementation that you can review.

Like a lobster shell, security has layers — review code before you run it.

latestvk979kap7nfx162rhdapqas32js83remc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments