Risk Profile
v1.0.0Assess a user's personal risk profile to identify their biggest financial, health, and lifestyle risks and recommend appropriate insurance and protection str...
⭐ 0· 110·1 current·1 all-time
byWenbing Ji@jiwenbing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the runtime instructions: conducting a questionnaire, scoring risks, mapping to insurance, and prioritizing protection strategies. There are no unrelated dependencies, binaries, or credentials required.
Instruction Scope
SKILL.md is narrowly scoped to asking about age, health, job, dependents, assets, debts, and lifestyle and then producing a prioritized protection plan. It does not direct the agent to read system files, environment variables, or send data to external endpoints. Note: it will require collection of sensitive personal data (health, finances) from the user — this is expected for the purpose but should be handled with privacy protections.
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest-risk install profile (nothing is written to disk or installed).
Credentials
No environment variables, credentials, or config paths are requested. The lack of external API keys or system access is proportionate to the stated functionality.
Persistence & Privilege
always is false and the skill is user-invocable only. It does not request persistent or elevated system privileges.
Assessment
This skill looks coherent for producing a personal risk and insurance plan, but remember: (1) it will ask for sensitive personal information — do not provide highly sensitive identifiers (SSN, account passwords) unless you trust how data is stored/used; (2) this is general advice — verify regulatory or licensed-advisor requirements for insurance recommendations in your jurisdiction; (3) if you plan to deploy this skill widely, add explicit privacy, consent, and data-retention rules so users know how their responses are handled.Like a lobster shell, security has layers — review code before you run it.
latestvk97bczbs6nnvknnbca017hdbvn832ca9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
