Conversion Waterfall

v1.0.0

Analyze customer conversion through funnel stages. Use for identifying drop-off points and optimization opportunities.

0· 88·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (conversion/funnel analysis) matches the SKILL.md instructions and output templates. The skill does not request unrelated tools, binaries, or credentials.
Instruction Scope
Instructions are scoped to analyzing conversion rates and producing a waterfall report. However, the skill is vague about where input data should come from (it uses a generic $ARGUMENTS placeholder). That ambiguity means an agent using this skill may ask the user to upload CSVs or request access to analytics platforms; the SKILL.md itself does not direct the agent to read system files or external services.
Install Mechanism
No install spec or code is provided (instruction-only), so nothing will be written to disk and no external packages are fetched.
Credentials
No environment variables, credentials, or config paths are required. The skill does not request access to unrelated secrets or services.
Persistence & Privilege
The skill is user-invocable, not always-enabled, and does not request persistent or elevated privileges or modify other skills/configurations.
Assessment
This skill is low-risk and appears to do what it says (generate a conversion waterfall and recommendations). Before using it: (1) be clear about how you will supply data — avoid pasting sensitive PII or credentials into the chat; (2) if the agent asks to connect to analytics tools, only provide credentials via your platform's official connectors (not in free text); (3) test the skill with non-sensitive sample data first to confirm assumptions (stage definitions, time windows, attribution), and (4) review any recommendations before applying them to production. If you need the skill to pull data automatically, expect to configure connectors or provide explicit, limited access — otherwise it will need you to supply the data inputs.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cjna0hwvm2fyfgd4rfgd5xd8390wv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments