竞品分析器 Competitor Analyzer

v2.0.0

使用场景: - 用户说"竞品分析"、"做竞调" - 用户说"帮我分析XX和XX" - 用户说"竞争对手有哪些" - 用户说"产品对比"、"市场调研" - 用户粘贴竞品名称说"帮我做个分析" - 用户说"了解XX行业" - 用户说"做个对比报告" 不适用: - 股票分析(用stock-research-group)...

0· 57·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, templates, and required tools (WebSearch, Read, Write) align with a competitor-analysis/reporting assistant. No unrelated environment variables, binaries, or config paths are requested.
Instruction Scope
SKILL.md focuses on producing structured reports and cites public sources (official sites, 36Kr, Tianyancha, app stores, social media). It does not instruct reading local files or grabbing secrets. Minor note: guidance like '亲自体验/下载' (manually try or download products) is ambiguous—it reads as human guidance rather than an instruction to access the user's device, but could be misinterpreted by an agent with broader capabilities. Overall scope stays within expected bounds.
Install Mechanism
No install spec, no code files, and no external downloads—this is the lowest-risk pattern (instruction-only).
Credentials
The skill requests no environment variables, credentials, or config paths. Remember/memory items listed are reasonable for personalization but do not require secret access.
Persistence & Privilege
always:false (default). It mentions remembering user preferences/industry which is normal for personalization; nothing suggests modification of other skills or persistent privileges beyond typical agent memory.
Assessment
This skill appears coherent and matches its purpose. Before installing: do not provide any private API keys or proprietary documents to the skill; verify and cite source links the agent produces (desktop research is error-prone); treat any product-download or 'try it yourself' advice as a manual step rather than the agent actually downloading executables; and be mindful that remembered user information (industry, product positioning) may be stored—avoid putting confidential secrets into conversational memory unless you trust the storage policy.

Like a lobster shell, security has layers — review code before you run it.

latestvk976gbsssc8va8d25v2tpkpkfx83qn9y

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments