Customer Experience
v1.0.0Map and analyze customer experience touchpoints. Use for improving satisfaction, loyalty, and customer journey optimization.
⭐ 0· 100·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill name/description (customer experience mapping and analysis) matches the SKILL.md content (journey stages, metrics, templates). It requests no binaries, env vars, or config paths — which is proportionate for a template/instruction-only CX helper.
Instruction Scope
The runtime instructions are templates and guidance for producing a journey map, scorecard, and action plan. They do not instruct the agent to read local files, environment variables, or call external endpoints, nor do they direct transmission of data to unknown servers.
Install Mechanism
No install spec or code files are present. Being instruction-only means nothing is written to disk and no external packages are fetched — the lowest-risk pattern.
Credentials
The skill declares no required environment variables, secrets, or config paths. There is no disproportionate credential or environment access requested.
Persistence & Privilege
always is false (default) and the skill has no install-time actions or claims of modifying agent/system settings. The default ability for the model to invoke the skill autonomously is normal and does not change the assessment here.
Assessment
This skill appears to be a safe, coherent set of templates and advice for CX mapping. Before installing or using it, avoid pasting sensitive customer data or personally identifiable information into prompts (the skill itself has no safeguards), verify any quantitative results (metrics and gaps) against your real data, and treat outputs as starting points — validate recommended actions with real user research. Because it's instruction-only, risk is low, but exercise normal data-governance caution when feeding customer records or internal analytics into the agent.Like a lobster shell, security has layers — review code before you run it.
latestvk971f8bx13p8zdjt1d2eypvzqn83829p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
