Forecasting
v1.0.0Apply quantitative and qualitative forecasting techniques. Use for demand planning, revenue projections, and trend analysis.
⭐ 0· 122·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (forecasting, demand/revenue projections) align with the SKILL.md content: methods, selection guidance, and an output template. The skill does not request unrelated binaries, credentials, or config.
Instruction Scope
Runtime instructions are minimal and generic ('Apply appropriate forecasting techniques for $ARGUMENTS') and include a useful output template. They do not instruct the agent to read system files, environment variables, or send data externally, but the wording is open-ended and gives the agent broad discretion about what input/context to use—so you should be explicit when providing data and context.
Install Mechanism
No install spec and no code files (instruction-only). This is lowest-risk: nothing will be written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate access requested relative to forecasting functionality.
Persistence & Privilege
always:false (default) and no requests to modify agent/system settings. The skill can be invoked autonomously per platform defaults, which is normal for skills of this type.
Assessment
This skill appears internally consistent and low-risk because it is instruction-only and requests no credentials or installs. However, the instructions are intentionally general—when you use it, provide explicit, non-sensitive sample data and clear constraints (time horizon, required confidence intervals, allowed data sources). Avoid pasting secrets (API keys, raw database extracts), and consider testing outputs on synthetic data first. If you are concerned about autonomous runs, keep using user-invocation only or monitor the agent's requests for additional context before granting access to real datasets. If the skill later adds install steps, environment variables, or file-system access, reassess immediately.Like a lobster shell, security has layers — review code before you run it.
latestvk97frg03b9g0mry580qjvrawah83bhfm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
