Capability Assessment

v1.0.0

Assess organizational capabilities using radar charts. Use for competitive analysis, gap identification, and strategic planning.

0· 146·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the actual content: a textual template and guidance for capability mapping and radar charts. The skill requests no binaries, credentials, or config paths that would be unnecessary for its stated purpose.
Instruction Scope
SKILL.md provides a high-level template and tips for producing assessments and radar-chart output. It is intentionally general (e.g., 'Assess capabilities for $ARGUMENTS'), which gives the agent scope to ask for or rely on user-supplied context; there are no instructions to read files, access environment variables, or transmit data externally.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill does not require any environment variables, credentials, or config paths. There is no disproportionate access requested relative to the described functionality.
Persistence & Privilege
always is false and there are no indications the skill requests permanent presence or elevated privileges. The default ability for the agent to invoke the skill autonomously remains in effect but is not a unique concern here.
Assessment
This skill is a harmless template for capability/radar assessments and appears coherent. Before using it, avoid pasting sensitive or proprietary data into prompts (benchmarks or internal evidence can be sensitive). If you want objective comparisons, prepare and control the benchmark data source (don’t rely on the model to fetch competitor data). Because the instructions are high-level, verify outputs for accuracy and bias — treat the results as a starting point, not a definitive analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ary76gkfgjh753vjdc68xy98382v9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments