data-analysis

v1.0.0

Data analysis and visualization. Query databases, generate reports, automate spreadsheets, and turn raw data into clear, actionable insights. Use when (1) yo...

0· 21·0 current·0 all-time
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (data analysis & visualization) match the provided materials: guidance docs, chart guidance, metric contracts and templates. There are no unrelated env vars, binaries, or config paths requested.
Instruction Scope
The SKILL.md and supporting files are prose guidance and templates for analysis. They do not instruct the agent to read system files, access secrets, or call external endpoints outside the user-provided data context.
Install Mechanism
No install spec and no code files — nothing is written to disk or downloaded. This is the lowest-risk category for install mechanism.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportional for an instruction-only analysis/templating skill.
Persistence & Privilege
Flags show default behavior (always: false, model invocation allowed). The skill does not request persistent presence or system-level changes and does not modify other skills' configs.
Assessment
This skill is a set of written best-practices, templates, and checklists for doing data analysis; it does not require installation or secrets. Before using it: (1) avoid pasting sensitive credentials or raw PII into prompts — supply only the minimal, sanitized data or scoped database credentials as needed; (2) verify any live data connections you create use least-privilege, time-limited credentials under your control; (3) if you want a runnable integration (SQL queries, notebooks), prefer creating those artifacts locally or in trusted infrastructure rather than sending full production dumps to the agent; (4) confirm the skill’s homepage/owner if you need provenance — the skill is instruction-only so there is no bundled code to inspect.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

D Clawdis
OSLinux · macOS · Windows
aivk9776vmz98m74vjr192n0ksp698562t1latestvk9776vmz98m74vjr192n0ksp698562t1
21downloads
0stars
1versions
Updated 4h ago
v1.0.0
MIT-0
Linux, macOS, Windows

When to Use

Use this skill when the user needs to analyze, explain, or visualize data from SQL, spreadsheets, notebooks, dashboards, exports, or ad hoc tables.

Use it for KPI debugging, experiment readouts, funnel or cohort analysis, anomaly reviews, executive reporting, and quality checks on metrics or query logic.

Prefer this skill over generic coding or spreadsheet help when the hard part is analytical judgment: metric definition, comparison design, interpretation, or recommendation.

User asks about: analyzing data, finding patterns, understanding metrics, testing hypotheses, cohort analysis, A/B testing, churn analysis, or statistical significance.

Core Principle

Analysis without a decision is just arithmetic. Always clarify: What would change if this analysis shows X vs Y?

Methodology First

Before touching data:

  1. What decision is this analysis supporting?
  2. What would change your mind? (the real question)
  3. What data do you actually have vs what you wish you had?
  4. What timeframe is relevant?

Statistical Rigor Checklist

  • Sample size sufficient? (small N = wide confidence intervals)
  • Comparison groups fair? (same time period, similar conditions)
  • Multiple comparisons? (20 tests = 1 "significant" by chance)
  • Effect size meaningful? (statistically significant != practically important)
  • Uncertainty quantified? ("12-18% lift" not just "15% lift")

Architecture

This skill does not require local folders, persistent memory, or setup state.

Use the included reference files as lightweight guides:

  • metric-contracts.md for KPI definitions and caveats
  • chart-selection.md for visual choice and chart anti-patterns
  • decision-briefs.md for stakeholder-facing outputs
  • pitfalls.md and techniques.md for analytical rigor and method choice

Quick Reference

Load only the smallest relevant file to keep context focused.

TopicFile
Metric definition contractsmetric-contracts.md
Visual selection and chart anti-patternschart-selection.md
Decision-ready output formatsdecision-briefs.md
Failure modes to catch earlypitfalls.md
Method selection by question typetechniques.md

Core Rules

1. Start from the decision, not the dataset

  • Identify the decision owner, the question that could change a decision, and the deadline before doing analysis.
  • If no decision would change, reframe the request before computing anything.

2. Lock the metric contract before calculating

  • Define entity, grain, numerator, denominator, time window, timezone, filters, exclusions, and source of truth.
  • If any of those are ambiguous, state the ambiguity explicitly before presenting results.

3. Separate extraction, transformation, and interpretation

  • Keep query logic, cleanup assumptions, and analytical conclusions distinguishable.
  • Never hide business assumptions inside SQL, formulas, or notebook code without naming them in the write-up.

4. Choose visuals to answer a question

  • Select charts based on the analytical question: trend, comparison, distribution, relationship, composition, funnel, or cohort retention.
  • Do not add charts that make the deck look fuller but do not change the decision.

5. Brief every result in decision format

  • Every output should include the answer, evidence, confidence, caveats, and recommended next action.
  • If the output is going to a stakeholder, translate the method into business implications instead of leading with technical detail.

6. Stress-test claims before recommending action

  • Segment by obvious confounders, compare the right baseline, quantify uncertainty, and check sensitivity to exclusions or time windows.
  • Strong-looking numbers without robustness checks are not decision-ready.

7. Escalate when the data cannot support the claim

  • Block or downgrade conclusions when sample size is weak, the source is unreliable, definitions drifted, or confounding is unresolved.
  • It is better to say "unknown yet" than to produce false confidence.

Common Traps

  • Reusing a KPI name after changing numerator, denominator, or exclusions -> trend comparisons become invalid.
  • Comparing daily, weekly, and monthly grains in one chart -> movement looks real but is mostly aggregation noise.
  • Showing percentages without underlying counts -> leadership overreacts to tiny denominators.
  • Using a pretty chart instead of the right chart -> the output looks polished but hides the actual decision signal.
  • Hunting for interesting cuts after seeing the result -> narrative follows chance instead of evidence.
  • Shipping automated reports without metric owners or caveats -> bad numbers spread faster than they can be corrected.
  • Treating observational patterns as causal proof -> action plans get built on correlation alone.

Approach Selection

Question typeApproachKey output
"Is X different from Y?"Hypothesis testp-value + effect size + CI
"What predicts Z?"Regression/correlationCoefficients + R² + residual check
"How do users behave over time?"Cohort analysisRetention curves by cohort
"Are these groups different?"SegmentationProfiles + statistical comparison
"What's unusual?"Anomaly detectionFlagged points + context

For technique details and when to use each, see techniques.md.

Output Standards

  1. Lead with the insight, not the methodology
  2. Quantify uncertainty - ranges, not point estimates
  3. State limitations - what this analysis can't tell you
  4. Recommend next steps - what would strengthen the conclusion

Red Flags to Escalate

  • User wants to "prove" a predetermined conclusion
  • Sample size too small for reliable inference
  • Data quality issues that invalidate analysis
  • Confounders that can't be controlled for

External Endpoints

This skill makes no external network requests.

EndpointData SentPurpose
NoneNoneN/A

No data is sent externally.

Security & Privacy

Data that leaves your machine:

  • Nothing by default.

Data that stays local:

  • Nothing by default.

This skill does NOT:

  • Access undeclared external endpoints.
  • Store credentials or raw exports in hidden local memory files.
  • Create or depend on local folder systems for persistence.
  • Create automations or background jobs without explicit user confirmation.
  • Rewrite its own instruction source files.

Related Skills

Install with clawhub install <slug> if user confirms:

  • sql - query design and review for reliable data extraction.
  • csv - cleanup and normalization for tabular inputs before analysis.
  • dashboard - implementation patterns for KPI visualization layers.
  • report - structured stakeholder-facing deliverables after analysis.
  • business-intelligence - KPI systems and operating cadence beyond one-off analysis.

Feedback

  • If useful: clawhub star data-analysis
  • Stay updated: clawhub sync

Comments

Loading comments...