Market Sizing

v1.0.0

Estimate market size using top-down, bottom-up, and triangulation methods. Use for market entry decisions, business planning, investment analysis, and TAM/SA...

0· 98·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (market sizing/TAM-SAM-SOM) match the SKILL.md content. The skill is instruction-only and asks for market definition, multiple estimation methods, triangulation and sensitivity testing — all appropriate for the described purpose.
Instruction Scope
Instructions are focused on market-sizing methods and output format. They are somewhat open-ended (e.g., 'Gather data — Research, interviews, reports'), which is expected for this task but gives the agent discretion to fetch external public sources or ask the user for additional context. The SKILL.md does not instruct the agent to read local files, access unrelated env vars, or transmit data to unknown endpoints.
Install Mechanism
No install spec and no code files. Lower risk because nothing is downloaded or written to disk by the skill package itself.
Credentials
The skill declares no environment variables, credentials, or config paths. That is proportionate to an instruction-only market analysis helper.
Persistence & Privilege
always is false and the skill does not request elevated or persistent privileges. Autonomous invocation is allowed by default but is not combined with any broad permissions or credential access here.
Assessment
This skill is internally coherent and low-risk: it only supplies instructions for doing market sizing and does not request credentials or install code. Before using it, be aware that the agent following its instructions may (a) browse public web sources for data, (b) ask you for additional context or proprietary numbers (do not paste secrets or credentials), or (c) request permission to use tools you have connected (e.g., web browsing, file access). If you want to limit data exposure, avoid giving proprietary spreadsheets or API keys to the agent and confirm which external tools it will use when it begins research.

Like a lobster shell, security has layers — review code before you run it.

latestvk978m4987zqg9nesyhev5rnbkd83aeva

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments