Value Chain

v1.0.0

Map industry value chain to understand where value is created and captured. Use for industry analysis, vertical integration decisions, and identifying strate...

0· 96·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (value-chain analysis, industry mapping) match the provided SKILL.md instructions. The skill declares no binaries, env vars, or config paths, which is proportionate for a purely analytic instruction set.
Instruction Scope
SKILL.md contains only guidance for mapping stages, identifying players, estimating margins, and analyzing power dynamics. It does not instruct the agent to read local files, access credentials, call external endpoints, or exfiltrate data. The guidance to 'use data' is generic and does not mandate data collection from the user's system.
Install Mechanism
No install spec or code files are present; this is an instruction-only skill. Nothing will be written to disk or executed as part of installation.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate given its stated analytic function.
Persistence & Privilege
The skill is not set to always:true and uses default agent invocation rules. It does not request persistent or elevated privileges.
Assessment
This skill is instruction-only and coherent with its stated purpose. Before using it, consider: (1) do not paste sensitive corporate secrets into prompts—analysis should rely on non-confidential inputs or sanitized figures; (2) the quality of outputs depends entirely on the data you provide or the external sources the agent may consult, so verify facts (margins, market shares) from trusted sources; (3) if you plan to let an autonomous agent invoke this skill, be aware it may produce recommendations based on the input it’s given—limit access to sensitive systems or credentials. Overall low technical risk, but exercise normal caution about the inputs you share.

Like a lobster shell, security has layers — review code before you run it.

latestvk975s002mas0xzhbdk55fpykdx83d0cz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments