BI Analyst

v1.0.0

Generate personalized career roadmaps for aspiring Business Intelligence analysts based on assessment data, experience, and professional goals.

1· 84·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the provided SKILL.md and openapi.json. The skill does not request unrelated binaries, credentials, or config paths and the provided endpoints/schema align with generating a roadmap.
Instruction Scope
SKILL.md is limited to describing request/response payloads and endpoints for generating roadmaps and health checks. It does not instruct reading local files, environment variables, or other system state. One small note: the API host/base URL is not specified in the documentation—invocation would require a runtime endpoint decision outside the skill, so callers should confirm the target host before sending user data.
Install Mechanism
No install spec or code files; this is instruction-only. Nothing will be written to disk or downloaded during install.
Credentials
Requires no environment variables, secrets, or credentials. The declared environment access is minimal and proportional to the skill's purpose.
Persistence & Privilege
Skill is not always-enabled and uses default model invocation behavior. It does not request system-wide configuration changes or persistent privileges.
Assessment
This skill is an instruction-only API spec for creating BI career roadmaps and appears internally consistent. Before installing or using it, confirm (1) the actual API host/endpoints you or the agent will call—this skill does not include a hosting URL—and (2) the privacy/security policy of that host, because you may send personal assessment data. No credentials or installs are required by the skill itself, so the main risk is accidentally transmitting sensitive user data to an unknown external service; verify the service operator and pricing/terms before sending real user data.

Like a lobster shell, security has layers — review code before you run it.

latestvk971b5wzstn6w6fkxbzc7xdxb183erft

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments