Ecommerce Weekly Report
v1.0.0Turn messy weekly ecommerce performance data into an operator-ready report with KPI trends, winners, risks, and next-step recommendations. Use when teams nee...
⭐ 0· 184·2 current·2 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the actual content: the skill describes how to convert weekly ecommerce data into a report and requires only the data inputs noted in SKILL.md. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md gives a focused workflow (confirm period, compute KPIs, identify drivers, produce highlights/risks/actions) and references an output template. It does not instruct the agent to read unrelated files, access environment variables, or transmit data externally.
Install Mechanism
There is no install spec and no code files; this is instruction-only so nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The requested inputs are limited to the expected ecommerce KPIs and optional dimensions.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges or attempt to modify other skills or system-wide settings.
Assessment
This skill is instruction-only and appears coherent for its stated goal, but it will operate on whatever data you provide. Do not paste sensitive PII or raw customer lists into the prompt; instead provide aggregated KPIs or redacted samples. Verify data scope and definitions (e.g., how profit is calculated) before accepting conclusions, and run the skill on non-sensitive sample data first to confirm its assumptions and outputs. If you plan to let an agent invoke this autonomously, remember it will process any data you feed it—avoid granting external credentials or uploading confidential datasets unless you trust the agent and environment.Like a lobster shell, security has layers — review code before you run it.
latestvk97ehayaasp5rqsgmrychwxcgs83chxp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
