Guarantee Design And Selection

v1.0.0

Design, select, and word a risk-reversal guarantee for a product or service offer. Use this skill when the user wants to add a guarantee to an offer, asks "w...

0· 56·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (guarantee design) matches the SKILL.md: the instructions focus on choosing guarantee types, wording, and ROI math. No unrelated services, binaries, or credentials are requested.
Instruction Scope
The instructions ask the agent to read any existing offer documents and refund/cancellation data 'if found' in the agent environment and to request missing inputs from the user. Reading offer documents and metrics is appropriate for this task, but it implies the agent may access files present in its environment — review which files the agent can read if those could contain sensitive data.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The runtime instructions ask only for product/price/fulfillment/metrics information, which is proportional to crafting guarantees.
Persistence & Privilege
always:false and default model-invocation settings. The skill does not request persistent installation or elevated privileges and does not modify other skills or system-wide settings.
Assessment
This skill is low-risk and directly aligned with writing guarantees. Before enabling it, be prepared to provide product description, price, fulfillment cost, and refund/close-rate metrics (or let the agent ask). Note the agent may read offer documents present in its environment — don't place secrets or unrelated sensitive files where the agent can access them. Because it is instruction-only, there are no downloads or external credentials required. If you need stricter control, supply necessary inputs directly instead of letting the agent search local files.

Like a lobster shell, security has layers — review code before you run it.

bookforgevk979c6s1xrkcwj7nnv0522df5n84e56qguaranteesvk979c6s1xrkcwj7nnv0522df5n84e56qlatestvk979c6s1xrkcwj7nnv0522df5n84e56qoffersvk979c6s1xrkcwj7nnv0522df5n84e56qpricingvk979c6s1xrkcwj7nnv0522df5n84e56qrisk-reversalvk979c6s1xrkcwj7nnv0522df5n84e56qsalesvk979c6s1xrkcwj7nnv0522df5n84e56q

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📚 Clawdis

Comments