Demand Signals
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This is a document-only market-research skill that may influence inventory spending and use business account data, but the provided artifacts show no code, hidden execution, or credential handling.
This skill appears safe to install as an instruction-only market-analysis aid. Before using it, decide what account data and business details you are comfortable sharing, keep completed reports private, and do not let the agent place inventory orders or reorders without explicit human review.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A user could spend money on inventory or commit to supplier orders based on the skill’s analysis.
The template can produce concrete inventory purchase and reorder recommendations. This is aligned with the skill’s sourcing purpose, but acting on it can commit real capital.
Initial order quantity: [Number] units ... Maximum capital at risk: [Dollar amount] ... Sales exceed 20 units/day for 7 consecutive days ... Place reorder of 2,000 units via sea freight
Use the report as advisory input only; require explicit human approval before contacting suppliers, placing orders, reordering inventory, or making purchases.
Business-sensitive marketplace, advertising, or seller-account data could be exposed in prompts or reports if shared carelessly.
The workflow may use account-specific seller analytics. The artifacts do not show credential collection or automated login, but users may provide proprietary account data during analysis.
Check Amazon search term reports if you have Seller Central access. Amazon Brand Analytics "Search Query Performance" data reveals what shoppers are searching for before they buy.
Prefer exported or read-only data, avoid sharing passwords or tokens, and limit the analysis to the minimum account data needed.
If stored or reused without care, outdated or sensitive business information could affect future decisions or reveal competitive plans.
Completed reports may persist and influence later sourcing decisions; they can contain supplier names, costs, margins, capital-at-risk, and strategic assumptions.
This report becomes the basis for your go/no-go decision and the reference document for any subsequent reorder evaluations.
Keep completed reports private, remove sensitive supplier or financial details before sharing, and re-validate old reports before using them for new orders.
