Sector Charts

v1.0.0

Visualize competitive positioning using sector charts. Use for market analysis and competitive strategy.

0· 89·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name, description, and runtime instructions all describe producing sector/bubble charts. There are no unexpected environment variables, binaries, or install steps required, which is consistent with the stated purpose.
Instruction Scope
SKILL.md provides templates, axis/size/color guidance, and an example output layout; it does not instruct the agent to read arbitrary system files or transmit data to third parties. However the instructions are high-level and do not specify how data is sourced or how charts are rendered (no plotting library, file format, or endpoint specified), so the agent may take broad discretion (e.g., fetch external data or call a plotting API) unless you constrain it.
Install Mechanism
No install specification or code files are present. As an instruction-only skill, it makes no changes to disk or install external packages.
Credentials
The skill declares no required environment variables, credentials, or config paths. Nothing requested appears disproportionate to generating charts.
Persistence & Privilege
always is false and the skill is user-invocable (defaults). It does not request persistent presence or modify other skills or system settings.
Assessment
This is an instruction-only charting template with minimal risk, but it's vague about where data comes from and how charts are produced. Before installing: (1) decide and specify the data source (upload data or allow specific APIs) so the agent doesn't fetch arbitrary data; (2) specify desired output format (PNG/SVG/CSV) or required plotting tools; (3) avoid sending sensitive company data unless you trust the agent and its environment; and (4) if you expect automated internet access, confirm the agent's network policies. If you need stricter behavior, ask the skill author to add explicit data sourcing and rendering steps.

Like a lobster shell, security has layers — review code before you run it.

latestvk978ynk5n22e6s3crmhnyq4m7983a1x5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments