Pest Analysis

v1.0.0

Analyze macro-environmental factors affecting an industry or company. Use as a precursor to strategic analysis, market entry assessment, or scenario planning.

0· 90·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (PEST analysis) match the SKILL.md instructions: identify, categorize, assess, and prioritize macro-environmental factors. There are no unrelated requirements (no env vars, binaries, or installs) that would be disproportionate to the stated purpose.
Instruction Scope
The runtime instructions stay within scope: they describe how to brainstorm, categorize, assess impact/probability, and produce a formatted PEST output for the provided $ARGUMENTS. The SKILL.md does not instruct reading files, accessing environment variables, calling external endpoints, or exfiltrating data.
Install Mechanism
There is no install spec and no code files — the skill is instruction-only, which minimizes risk because nothing is written to disk or downloaded during installation.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportionate: a PEST analysis does not require access to external secrets or system configuration.
Persistence & Privilege
always is false and there are no elevated privileges requested. The skill may be invoked autonomously by the agent (disable-model-invocation is false), which is the platform default; given the skill's lack of external access or credentials, this does not introduce elevated risk here.
Assessment
This skill is instruction-only and appears internally consistent with its stated purpose. It does not request credentials, install software, or access files, so technical risk is low. Before using it: avoid pasting confidential or proprietary data into the prompt (the skill will analyze whatever you give it), specify the time horizon and context for accurate results, and validate any factual claims the skill produces against trusted sources if you need them for decision-making. If you want the skill to access live market data or internal documents, implement that via a separate, explicit integration that requires appropriate credentials and review.

Like a lobster shell, security has layers — review code before you run it.

latestvk978h31f016j3vm14xqft7qwg983df1e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments