E-Commerce Business Plan

v1.0.0

Create a comprehensive e-commerce business plan. Market analysis, financial projections, marketing strategy, operations planning, and milestone roadmap for n...

1· 344·1 current·1 all-time
bynexscope-ai@nexscope
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the runtime instructions: collect user inputs, ask one follow-up, analyze market/financials, and output a plan. There are no unrelated env vars, binaries, or config paths requested.
Instruction Scope
The SKILL.md stays within the expected scope for creating business plans. One caveat: Step 3 says “Research and analyze” without bounding where or how to research (web, proprietary databases, or agent tools). That vagueness could cause the agent to fetch external data or use web-connected tools if available.
Install Mechanism
There is no registry install spec and no code files (low install risk). However, the SKILL.md includes an example npx install command (npx skills add nexscope-ai/eCommerce-Skills) which would pull external code if a user runs it — this is not part of the registry metadata and should be reviewed before running.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate for a planning/consulting skill.
Persistence & Privilege
always is false and autonomous invocation is the platform default; the skill does not request elevated persistence or to modify other skills or system configs.
Assessment
This skill appears to do what it says and does not ask for secrets or install things by itself. Actions to consider before installing/using: (1) Don’t blindly run the npx command in the SKILL.md — that would fetch external code; review that package/source first if you plan to install it. (2) Clarify whether you want the agent to perform live web research — if your agent has browsing or external connectors enabled, the skill’s unbounded “research” step could cause network requests and external data access. (3) If you care about data privacy, avoid sharing sensitive company financials in raw form; the skill will ask for inputs and produce estimates. Overall the skill is internally consistent, but inspect any external packages or web access the agent would use before proceeding.

Like a lobster shell, security has layers — review code before you run it.

latestvk9779rkhqxcar3yc74ptqv0n8583ja9r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments