Fundraise Plan
v1.0.0Create a structured fundraising plan including goal setting, target audience, channel strategy, timeline, and success metrics. Use when organizations or indi...
⭐ 0· 143·0 current·0 all-time
byWenbing Ji@jiwenbing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (fundraising plan) align with the content of SKILL.md. The skill requests no binaries, env vars, or config paths that would be unnecessary or disproportionate for its stated purpose.
Instruction Scope
SKILL.md contains only structured guidance steps for planning a fundraising campaign (goals, audience, channels, timeline, KPIs, budget, contingency). It does not instruct the agent to read system files, access credentials, call external endpoints, or collect unrelated data.
Install Mechanism
There is no install spec and no code files — this is instruction-only, so nothing is written to disk or downloaded. That is proportionate for a planning assistant.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no apparent need for secrets or external service access to perform the described task.
Persistence & Privilege
always is false and the skill is user-invocable. It does not request persistent system presence or elevated privileges. Autonomous invocation is allowed by platform default but not granted extra privileges by this skill.
Assessment
This skill is instruction-only and appears coherent and low-risk. Before using it, avoid pasting private donor PII or confidential lists into prompts (the skill gives planning advice but cannot securely store or protect personal data). Verify any legal or fundraising compliance requirements independently (tax/donation rules, platform terms) and treat the plan as advisory — validate budgets, timelines, and outreach messaging before execution. If you want the agent to use real donor/contact data, ensure you trust the environment and that appropriate privacy controls are in place.Like a lobster shell, security has layers — review code before you run it.
latestvk97083ccqecxmj0t3xz3pwcb2n832zxd
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
