Kpc Comb
v1.0.0Visualize Key Purchase Criteria importance and performance. Use for competitive positioning and product strategy.
⭐ 0· 81·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (KPC comb) align with the SKILL.md content: the instructions describe producing importance vs performance analyses and comb-chart style outputs. No unrelated capabilities or credentials are requested.
Instruction Scope
SKILL.md contains only guidance and templates for analyzing criteria and producing outputs. It does not instruct the agent to read system files, access environment variables, call external endpoints, or perform actions outside the stated analysis task. The instructions are somewhat high-level (use $ARGUMENTS) but remain within scope.
Install Mechanism
No install spec and no code files — nothing is written to disk or downloaded. This is the lowest-risk model for installation.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate request for sensitive access.
Persistence & Privilege
always is false and the skill does not request persistent/system-wide changes. Autonomous invocation is allowed by default but the skill itself does not request elevated privileges or modifications to other skills.
Assessment
This is an instruction-only, self-contained skill that appears coherent and low-risk. Before using it with real customer data, test with non-sensitive examples to confirm output format and behavior. Remember that although the skill requests no credentials or network access, any content you provide may be sent to the model provider as part of normal operation — avoid including PII, secrets, or sensitive competitive data unless you trust your deployment. If you want stricter control, disable autonomous invocation or run the templates locally in a controlled environment.Like a lobster shell, security has layers — review code before you run it.
latestvk975wtf5j4fkztcmadwyk11gf583ct2n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
