Upsell Mapper

v1.0.0

Map product relationships and purchase sequence patterns to identify the best cross-sell triggers at checkout, post-purchase, and in creator content.

0· 35·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with the requested inputs and outputs. All declared inputs (SKU list, order history, placements) are appropriate and sufficient for the stated analytics task. There are no unexpected environment variables, binaries, or config paths required.
Instruction Scope
SKILL.md confines runtime behavior to ingesting user-supplied CSV/table data and producing an affinity map and playbooks. It explicitly states it does not connect to live ecommerce APIs and does not instruct reading system files or other environment state.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest-risk distribution model and matches the described manual data-paste workflow.
Credentials
The skill requests no credentials or secrets, which is proportionate. Note: the required inputs are order histories and notes that may contain customer PII; while not a mismatch, this is a privacy consideration for the user to manage.
Persistence & Privilege
always:false and the skill does not request persistent system presence or modify other skills. Model invocation is allowed (platform default) and is not otherwise elevated.
Assessment
This skill is coherent and runs from data you paste in, but before using it: (1) strip or anonymize customer PII (names, emails, full addresses, payment tokens) from exports you paste; (2) share only the columns needed (SKU, order date, qty, price, return flag) to reduce exposure; (3) verify the recommendations against merchandising judgment and seasonality before deploying; and (4) if you prefer tighter control, run the analysis locally or in a trusted environment where pasted data never leaves your systems.

Like a lobster shell, security has layers — review code before you run it.

latestvk977wjz6mevcpfvsqk4wrape8584v6qv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments