Asset Extension Modeling
v1.0.0Identify new business opportunities based on existing assets and capabilities. Use for market expansion, product development, and strategic growth.
⭐ 0· 91·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and runtime instructions all match: the SKILL.md provides a structured framework and templates for analyzing assets and generating extension opportunities. There are no requested binaries, env vars, or other resources that would be disproportionate to a strategic analysis skill.
Instruction Scope
Instructions are limited to business analysis tasks (asset assessment, opportunity generation, filtering, risk analysis, roadmap). The skill uses a placeholder $ARGUMENTS for input; it does not instruct the agent to read local files, environment variables, or send data to external endpoints. The content is template-driven and scoped to the stated domain.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes risk because nothing is written to disk or executed beyond the agent following the prose in SKILL.md.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no unexplained requests for secrets or access to unrelated services.
Persistence & Privilege
always:false and user-invocable:true (defaults). disable-model-invocation is false (agent may invoke autonomously), which is platform default and not in itself a concern given the skill's limited scope and lack of privileged access.
Assessment
This skill appears coherent and low-risk: it provides templates and a process for generating strategic opportunities and does not request credentials or perform installs. Before installing, consider: (1) avoid pasting sensitive secrets or proprietary documents into the skill input; (2) review any outputs before sharing externally (they may summarize confidential information you provide); and (3) if you enable autonomous agent invocation broadly, be aware the agent could call this skill without a separate prompt—keep autonomy settings aligned with your governance policies.Like a lobster shell, security has layers — review code before you run it.
latestvk9758j8s2d2xyxsq1pjyme20sd839sqr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
