产品规划助手
v1.0.1Helps complete high-quality product planning from requirements to implementation. Invoke when PM needs annual/quarterly/product iteration planning, reporting...
⭐ 0· 137·0 current·0 all-time
by@orzinfo
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the content: the skill provides product-planning guidance, templates, and step-by-step prompts. It declares no binaries, env vars, or config paths, which is appropriate for a purely instructional PM helper.
Instruction Scope
SKILL.md only contains questions, templates, and guidance for planning; it does not instruct the agent to read local files, call external endpoints, access environment variables, or transmit data. The scope stays within product-planning assistance.
Install Mechanism
No install spec and no code files present. This is low-risk and expected for a text-based assistant that runs purely as instructions.
Credentials
The skill requires no environment variables, credentials, or config paths. There is no disproportionate access requested relative to the described functionality.
Persistence & Privilege
always is false and the skill doesn't request persistent/system-wide changes. Model invocation is enabled (default), which is normal for a user-invocable skill; this combination does not raise extra concerns.
Assessment
This skill is instruction-only and appears coherent with its product-planning purpose, so it does not request secrets or install code. Before installing: 1) Note the source is unknown—if provenance matters, prefer skills with a known homepage or maintainer. 2) Review outputs before sharing externally (the skill will generate plans that may contain sensitive internal details you should redact). 3) If you want to prevent autonomous invocation, consider disabling model invocation for this skill in your agent settings. 4) Treat it as a template/helper — verify any recommended timelines, resource estimates, or technical assumptions with your team rather than applying them blindly.Like a lobster shell, security has layers — review code before you run it.
latestvk973j003f2zde2g4wb2e933q5183cyhb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
