Strategic Competitor Analysis
v1.0.0Conduct systematic competitor analysis to understand competitive positioning. Use for market entry, competitive strategy, and strategic planning.
⭐ 0· 136·0 current·0 all-time
by@linuszz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description describe competitor analysis and the SKILL.md contains only templates, frameworks, and output formats that align with that purpose. The skill requests no binaries, env vars, or config paths that would be inconsistent with its stated goal.
Instruction Scope
Runtime instructions are limited to defining analysis steps, templates, and recommended data sources (public sources, reports, customer feedback). There are no directives to read local files, access environment variables, call external endpoints, or exfiltrate data outside the analyst process.
Install Mechanism
No install spec and no code files — instruction-only — so nothing is written to disk or downloaded. This is the lowest-risk install profile.
Credentials
The skill declares no required credentials, environment variables, or config paths. That is proportional for a purely instructional competitor-analysis template.
Persistence & Privilege
always is false (default) and the skill does not request persistent system presence or modification of other skills or system settings. Autonomous invocation is allowed by platform default but the skill itself does not request elevated persistence.
Assessment
This skill appears coherent and low-risk because it only provides templates and instructions for competitor analysis and requests no installs or credentials. Before using: (1) avoid pasting confidential or sensitive internal data into prompts — the skill will process any text you provide; (2) validate any factual claims the skill generates against primary sources (reports, filings, trusted databases); (3) be mindful of legal/privacy constraints when collecting competitive intelligence (scraping or collecting personal data may have restrictions); (4) if you prefer no autonomous invocations at all, restrict the agent’s ability to call skills in your agent settings — autonomous invocation is platform-default, not something this skill requires.Like a lobster shell, security has layers — review code before you run it.
latestvk977y1fkxawdg27r58n7vr9qv583g8v1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
