Agile Pm Workflow Modular

v1.0.0

Modular PM workflow. Assembles required modules based on project type, auto-recommends essential vs optional modules, user confirms before execution.

0· 132·1 current·1 all-time
by路远@lambert-min
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (modular Agile PM workflow) align with the SKILL.md: the document describes modules, triggers, and output behaviors consistent with producing PRDs, prototypes, and related artifacts. No unrelated capabilities are requested.
Instruction Scope
SKILL.md contains only workflow logic, prompts, module definitions, and example dialogs. It does not instruct the agent to read local files, access environment variables, call external endpoints, or exfiltrate data. It explicitly waits for user confirmation before executing modules.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing will be written to disk or downloaded during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions do not reference any secrets or external-service credentials.
Persistence & Privilege
always:false (default) and model invocation is not disabled. This is the normal configuration for an instruction-only skill and does not request elevated persistence or cross-skill modifications.
Assessment
This skill appears internally consistent and safe in isolation: it only contains structured instructions for assembling PM modules and asks the user before acting. Before installing, consider: (1) avoid pasting any sensitive project secrets into prompts (no secret handling is implemented), (2) if you later add integrations (e.g., connect to Jira, Git, cloud storage), expect new env vars/permissions and re-evaluate, and (3) review generated deliverables for accuracy before sharing externally. Autonomous invocation is allowed by default but not unusual for instruction-only skills.

Like a lobster shell, security has layers — review code before you run it.

latestvk97axghg8t023ryjkrvn15rxmd83mamm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments