100 Percent Bars
v1.0.0Compare composition across segments using 100% stacked bars. Use for competitive analysis, cost structure comparison, and portfolio composition.
⭐ 0· 81·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions all describe creating 100% stacked bar charts for composition comparison; there are no unrelated environment variables, binaries, or install actions requested.
Instruction Scope
Instructions are generic and scoped to defining the analysis, gathering data, calculating totals, and producing charts. "Gather data" is open-ended (it doesn't specify data sources), so the agent may need user-supplied data or permission to access data sources; however, the SKILL.md does not instruct the agent to read unrelated system files or credentials.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes disk writes and reduces install-time risk.
Credentials
No environment variables, credentials, or config paths are requested; the requested footprint is minimal and proportionate to the stated purpose.
Persistence & Privilege
always:false (default) and no special persistence or system-wide configuration changes are requested. The skill may be invoked autonomously (platform default) but that is not a red flag on its own here.
Assessment
This skill is an instruction-only template for producing 100% stacked bar charts and appears coherent. Before using it, supply or confirm the data the agent should use (the instructions say to "gather data" but do not specify sources). Avoid granting the agent broad access to sensitive files or external data stores just to satisfy that step. If you allow autonomous invocation, consider whether you want the agent able to fetch data from your accounts or systems — otherwise provide the data directly in the prompt. Verify final charts and annotations for accuracy and source attribution.Like a lobster shell, security has layers — review code before you run it.
latestvk974m8m2v0hep54vzg1s1gtk3d839bhn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
