Reverse Costing

v1.0.0

Deconstruct competitor products to understand cost structure. Use for competitive pricing and cost analysis.

0· 81·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md: a high-level framework for estimating BOM, labor, overhead, and margin. The skill requests no binaries, env vars, or config paths — nothing extraneous to cost analysis is requested.
Instruction Scope
Instructions are high-level and template-driven (BOM estimation, wage rates, benchmarks). They do not explicitly instruct reading local files or transmitting data, but are vague and grant the agent broad discretion to gather external data or ask the user for inputs. This open-endedness can lead the agent to fetch web sources or request sensitive information if allowed.
Install Mechanism
No install spec and no code files — lowest-risk model: nothing will be written to disk or installed by the skill itself.
Credentials
The skill declares no environment variables, no primary credential, and no config paths. It does not ask for secrets or unrelated credentials.
Persistence & Privilege
always is false and the skill does not request persistent or elevated presence. Autonomous invocation is allowed by default (platform behavior) but the skill does not ask for extra privileges or to modify other skills.
Assessment
This skill is a coherent, low-risk instruction template for competitive cost estimation. Before installing, consider: (1) Do not provide proprietary cost spreadsheets or credentials to the agent — the skill may ask for inputs to run estimates. (2) If the agent has web access, it may fetch external benchmarks; restrict or monitor outbound access if you want to control sources. (3) Ensure any reverse-engineering or competitor analysis you perform complies with legal and ethical rules in your jurisdiction. (4) If you want tighter control, require the agent to ask for explicit permission before querying external sources or uploading any files.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a7nadpac16b52ves4rk4vy983a3ts

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments