Customer Segmentation
v1.0.0Segment customers into groups with similar needs and behaviors. Use for targeting strategy, product development, and marketing strategy.
⭐ 0· 112·1 current·1 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (customer segmentation) match the content of SKILL.md, which is a segmentation methodology and output template; there are no unrelated requirements (no env vars, binaries, or config paths).
Instruction Scope
Runtime instructions are a structured guide and output template for performing segmentation. They do not instruct the agent to read local files, environment variables, or send data to external endpoints; no broad or vague data collection is requested.
Install Mechanism
There is no install spec and no code files, so nothing is downloaded or written to disk; lowest-risk delivery model (instruction-only).
Credentials
The skill declares no required credentials, environment variables, or config paths. Requested inputs are conceptual (data sources, sample size) and appropriate for segmentation tasks.
Persistence & Privilege
Skill is not forced always-on and uses default autonomy settings. It does not request system-wide changes or persistent credentials.
Assessment
This skill is a harmless template and does not install code or ask for credentials. Consider these practical points before using: (1) Source unknown — there is no homepage or identifiable publisher; if provenance matters, verify origin. (2) The skill will ask you to supply customer data (surveys, transactions, etc.); avoid pasting PII or sensitive customer records into prompts unless you trust where the data will be processed. (3) Because it is instruction-only, it cannot run code on your machine, but any data you provide will be included in LLM requests — protect confidential data accordingly. (4) Treat the output as a human-created template: validate any segment assumptions with your real data and analytics tools before acting.Like a lobster shell, security has layers — review code before you run it.
latestvk978n3q7fz03gryyn8xybey6t1838fkb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
