Customer Segmentation

v1.0.0

Segment customers into groups with similar needs and behaviors. Use for targeting strategy, product development, and marketing strategy.

0· 112·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (customer segmentation) match the content of SKILL.md, which is a segmentation methodology and output template; there are no unrelated requirements (no env vars, binaries, or config paths).
Instruction Scope
Runtime instructions are a structured guide and output template for performing segmentation. They do not instruct the agent to read local files, environment variables, or send data to external endpoints; no broad or vague data collection is requested.
Install Mechanism
There is no install spec and no code files, so nothing is downloaded or written to disk; lowest-risk delivery model (instruction-only).
Credentials
The skill declares no required credentials, environment variables, or config paths. Requested inputs are conceptual (data sources, sample size) and appropriate for segmentation tasks.
Persistence & Privilege
Skill is not forced always-on and uses default autonomy settings. It does not request system-wide changes or persistent credentials.
Assessment
This skill is a harmless template and does not install code or ask for credentials. Consider these practical points before using: (1) Source unknown — there is no homepage or identifiable publisher; if provenance matters, verify origin. (2) The skill will ask you to supply customer data (surveys, transactions, etc.); avoid pasting PII or sensitive customer records into prompts unless you trust where the data will be processed. (3) Because it is instruction-only, it cannot run code on your machine, but any data you provide will be included in LLM requests — protect confidential data accordingly. (4) Treat the output as a human-created template: validate any segment assumptions with your real data and analytics tools before acting.

Like a lobster shell, security has layers — review code before you run it.

latestvk978n3q7fz03gryyn8xybey6t1838fkb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments