QSR Shift Reflection

v1.0.0

End-of-shift reflection and handoff logging skill for restaurant and franchise operators.

0· 26·0 current·0 all-time
byMcPherson AI@mcphersonai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (shift handoff logging, summaries, pattern detection) align with the SKILL.md content. The skill requests no binaries, env vars, or config paths that would be unnecessary for this purpose.
Instruction Scope
The instructions direct the agent to capture structured, persistent shift records, generate summaries/digests, and forward urgent items according to an in-skill configured method. That scope is consistent with the purpose, but the SKILL.md does not specify where or how the 'running archive' is stored or who can access forwarded alerts — this is an implementation/platform concern that the installer should clarify before use.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is downloaded or written to disk by the skill itself. This is the lowest-risk install profile.
Credentials
The skill requires no environment variables, credentials, or config paths. The requested data (shift notes, names/roles) is appropriate for the stated functionality.
Persistence & Privilege
The skill is not set to always-on, does not request elevated system privileges, and does not modify other skills' configurations. Autonomous invocation is allowed (platform default) but is not combined with other concerning privileges.
Assessment
This skill appears coherent and low-risk: it asks no secrets and does not install code. Before installing, confirm with the platform how persistent data will be stored, who can read it, retention/deletion policies, and how urgent alerts are actually delivered (e.g., internal chat vs external email/SMS). If you plan to record sensitive incidents (customer data, health/safety reports), check compliance requirements for storage and access. If you prefer not to persist logs to the agent's default memory, decline or restrict that behavior on the platform.

Like a lobster shell, security has layers — review code before you run it.

latestvk97574thh10aw1rfrh8zeq9bg1848mveoperationsvk97574thh10aw1rfrh8zeq9bg1848mveqsrvk97574thh10aw1rfrh8zeq9bg1848mverestaurantvk97574thh10aw1rfrh8zeq9bg1848mve

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments