Pyramid Principle

v1.0.0

Apply structured thinking and MECE principle to break down complex problems. Use at the start of any strategic analysis to organize thoughts and create compe...

0· 92·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Pyramid Principle, MECE structured thinking) match the SKILL.md content: instructions for structuring arguments and producing a Pyramid-style analysis. Nothing requested (no env vars, binaries, or config paths) is extraneous to that purpose.
Instruction Scope
The SKILL.md confines the agent to crafting structured analyses: define situation, complication, question, answer, supporting arguments, evidence, and MECE checks. It does not instruct the agent to read files, access environment variables, call external services, or exfiltrate data.
Install Mechanism
There is no install specification and no code files — the skill is purely instruction text. That minimizes on-disk or network risk and is proportionate for a conceptual/formatting helper.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no opaque secret names or unrelated credentials in the manifest — access level is minimal and appropriate.
Persistence & Privilege
always is false and there are no install hooks or self-modifying instructions. disable-model-invocation is false by default (normal for skills); this is not concerning here because the skill requires no sensitive access and is instruction-only.
Assessment
This skill is instruction-only and internally consistent with its stated purpose; it asks for nothing sensitive and performs no installs. The only minor caution: the skill's source/homepage is not provided, so if provenance matters to you, consider requesting the publisher identity or preferring a documented source. If the skill later adds code, installs, or requests environment variables, re-evaluate before enabling.

Like a lobster shell, security has layers — review code before you run it.

latestvk970c918v8jsbwh99rv5v3rb7d83c9ay

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments