Price Intel

v1.0.0

Monitor and analyze competitor pricing movements, discount patterns, and bundle strategies to inform your own pricing decisions without a race to the bottom.

0· 49·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (competitive pricing analysis) align with the instructions: the skill asks users to supply product/pricing inputs and produces a structured intelligence report. There are no unexpected required binaries, env vars, or external services declared.
Instruction Scope
Visible instructions keep scope to processing user-provided competitor data and producing a four-part report; the SKILL.md explicitly says it does not connect to live pricing APIs or scrapers. However the provided SKILL.md was truncated in your submission — the assessment assumes the rest of the file does not include unrelated instructions (e.g., reading arbitrary host files, prompting for credentials, or sending data to external endpoints). Please verify the complete SKILL.md before installing.
Install Mechanism
No install spec and no code files — lowest-risk model for persistence and disk writes.
Credentials
Skill does not request environment variables, credentials, or config paths. Inputs are user-supplied product/pricing observations, which is proportionate to the stated purpose.
Persistence & Privilege
Skill is not always-enabled and does not request elevated or persistent system-wide privileges. Autonomous model invocation is allowed by default but is not itself a red flag here.
Assessment
This skill is instruction-only and appears coherent with its stated purpose: it analyzes competitor pricing based on data you paste in. Before installing, do the following: (1) Review the complete SKILL.md (you provided a truncated copy) to ensure it does not instruct the agent to fetch web pages, read local files, or request credentials. (2) Never paste secrets, API keys, or internal-only financial data into the input fields — only share product names, public listing links, prices, and non-sensitive promotional notes. (3) Keep in mind legal/terms-of-service issues: collecting or sharing competitor data may be subject to platform rules in your region. (4) Test the skill with a small, non-sensitive dataset to verify outputs and to confirm it behaves as documented. If you want greater assurance, ask the publisher for the full SKILL.md or for clarification that the skill never issues network requests or asks for credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk977zjqmdvdtrbthvz9rk952xx84f8bg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments