Scenario Planning

v1.0.2

Perform project management what-if (scenario) analysis to simulate risks, delays, and resource changes. Use when planning schedules, assessing uncertainty, o...

0· 85·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (what-if scenario planning for schedules/costs/resources) align with the SKILL.md content. There are no unrelated environment variables, binaries, or config paths requested.
Instruction Scope
Runtime instructions stay within project-scheduling scope (baseline, variables, modify model in Excel/MS Project/Primavera, simulate and compare). Instructions do not ask to read unrelated system files, call external endpoints, or access secrets.
Install Mechanism
No install spec or code files are present (instruction-only). This minimizes disk writes and external code execution risk.
Credentials
The skill requests no environment variables, credentials, or config paths. Required access is limited to the user's project data (Excel/MS Project/Primavera files) implied by the purpose.
Persistence & Privilege
always is false and default model invocation is allowed (normal). The skill does not request permanent presence or system-wide configuration changes.
Assessment
This skill is coherent and low-risk: it provides step-by-step guidance for scenario analysis and doesn't request credentials or install code. Before using it, ensure you supply a proper baseline project file (and keep backups), confirm any file edits are done on a duplicated baseline (the SKILL.md already recommends this), and review outputs before applying changes to live plans. If you expect probabilistic (Monte Carlo) analysis rather than deterministic scenarios, ask for that explicitly. If you plan to let an autonomous agent operate on your project files, limit its file access and verify changes manually.

Like a lobster shell, security has layers — review code before you run it.

latestvk97003g1d35shq6n80982bsghn84bhr6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments