Prioritization Funnel
v1.0.0Evaluate and prioritize opportunities through a structured filtering process. Use for resource allocation, strategic decision support, and project management.
⭐ 0· 85·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (prioritization/funnel) match the SKILL.md content: a multi-stage scoring and selection process. Nothing in the metadata or instructions asks for unrelated capabilities.
Instruction Scope
SKILL.md contains only process guidance, tables, scoring guidance and monitoring metrics. It does not direct the agent to read files, access environment variables, call external endpoints, or exfiltrate data.
Install Mechanism
No install spec or code files are present — this is instruction-only, so nothing is written to disk or fetched at install time.
Credentials
The skill declares no environment variables, credentials, or config paths and the instructions do not reference any secrets; requested access is proportionate (none required).
Persistence & Privilege
always is false and there are no indications the skill modifies system or other-skill settings; autonomous invocation is permitted by default but the skill itself does not request elevated persistence.
Scan Findings in Context
[no-findings] expected: Regex-based scanner had nothing to analyze because the skill is instruction-only; this is expected.
Assessment
This skill is a standalone, read-only prioritization template and appears internally consistent. Before installing, consider: (1) the source/author is unknown — prefer skills from a known author if you require auditability; (2) avoid pasting sensitive or proprietary data into prompts driven by third-party skills; (3) if you plan to integrate this process with internal tools (spreadsheets, databases, or APIs), review and restrict what those integrations will allow; and (4) because the platform allows autonomous invocation by default, ensure your agent's autonomy settings and audit logs match your organization's risk tolerance.Like a lobster shell, security has layers — review code before you run it.
latestvk9785ak6r2pms7xvxje2v39x8s83dp54
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
