Market Definition

v1.0.0

Define market boundaries using substitution principle. Use for market sizing, competitive analysis, and strategic positioning.

0· 88·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (market boundary definition using the substitution principle) match the SKILL.md content. All instructions are about listing products, testing substitution, and documenting boundaries — nothing extraneous is requested.
Instruction Scope
The SKILL.md contains a self‑contained analytic framework and output templates. It does not instruct the agent to read files, access environment variables, call external endpoints, or gather system information beyond the analysis task.
Install Mechanism
There is no install specification and no code files. This is lowest-risk: nothing will be written to disk or executed by the platform beyond the agent following the textual instructions.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate for a purely instructive, analysis-focused skill.
Persistence & Privilege
The skill does not request always-on presence; autonomous invocation is allowed by default (platform normal). The skill does not attempt to modify agent/system configuration or access other skills' credentials.
Assessment
This skill is instruction-only and internally consistent with its stated purpose. It does not request credentials or install code, so the direct security risk is low. Before using it, consider: (1) provenance — the skill has no homepage or author details, so treat it like community guidance rather than authoritative tooling; (2) data sensitivity — don't paste confidential customer or financial data into prompts when asking the agent to apply the framework; and (3) review outputs — the framework relies on your assumptions and data, so validate any market boundaries with real data and stakeholders. If you need automatic data access or integrations (databases, cloud APIs), expect those to require separate, audited skills that explicitly request appropriate credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk970n0h9jqnr981kk5yqqj0v8s83dd6v

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments