Business Definition
v1.0.0Determine unified vs separated business entities. Use for portfolio management, strategic planning, and restructuring decisions.
⭐ 0· 110·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (business-entity definition / unified vs separated) align with the SKILL.md content. All requested capabilities are instructional and appropriate for strategic/portfolio analysis.
Instruction Scope
The SKILL.md contains only analysis steps, a decision framework, templates and guidance. It does not instruct the agent to read files, access environment variables, call external endpoints, or run system commands.
Install Mechanism
There is no install spec and no code files. Because this is instruction-only, nothing is written to disk and no third-party packages or downloads are required.
Credentials
The skill declares no environment variables, credentials, or config paths. That is proportionate to an advisory/analysis skill that only provides a framework and output templates.
Persistence & Privilege
The skill does not request always-on presence and does not modify system or other skills' configurations. Autonomous invocation is permitted by platform default but the skill itself has no privileged operations.
Assessment
This skill is an instruction-only framework (no code, no installs, no credentials) and appears coherent with its stated purpose. Before installing: (1) note the source is unknown—if provenance matters to you, prefer skills with a known author or published references; (2) review and, if needed, customize the decision criteria and templates to match your organization's specifics; (3) instruct agents not to collect or transmit sensitive corporate data when using the template unless you trust downstream handling; and (4) if a future version adds network calls, installs, or environment requirements, re-evaluate for proportionality and risk.Like a lobster shell, security has layers — review code before you run it.
latestvk97cvbw7n00faq5gndzxkd5pbx839s40
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
