Competitor Offer Monitor
v1.0.0Monitor major competitors' discounting and promotional moves, diagnose whether those moves plausibly caused a sudden drop in your own conversion rate, and de...
⭐ 0· 67·0 current·0 all-time
byRIJOY-AI@rijoyai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (competitor offer monitoring and price-match playbooks) align with the included files and runtime instructions. The skill does not request unrelated credentials, binaries, or config paths — nothing requested appears out of scope for competitive-pricing work.
Instruction Scope
SKILL.md contains a well-scoped template: context-gathering questions, a mandatory matrix, and reference playbook guidance. It does not instruct the agent to read system files, environment variables, or contact external endpoints beyond using included reference docs. It explicitly warns when not to use the skill (e.g., pure SEO or legal advice).
Install Mechanism
No install spec and no code files to write or execute — lowest-risk model. The skill is instruction-only and relies on included Markdown references; there are no downloads, extracted archives, or external package installs.
Credentials
The skill requires no environment variables, credentials, or config paths. Its data needs (CVR, AOV, competitor sightings) are operational/business inputs the user provides; there are no unexplained secrets or cross-service tokens requested.
Persistence & Privilege
always is false and autonomous invocation is the platform default; the skill does not demand permanent inclusion or modification of other skills or system-level settings. Its scope is limited to producing advisory outputs and templates.
Assessment
This skill is internally coherent and low-risk: it is an instruction-only playbook for diagnosing competitor promos and designing responses. Before installing, consider: (1) it will ask you to paste business metrics (CVR, AOV, traffic mixes) — do not paste secrets or credentials; (2) any operational price-match actions should be coordinated with legal, partners, and finance (the skill is explicitly not legal counsel); (3) validate assumptions with holdouts or measurement plans the skill recommends before changing pricing; and (4) if you later add automation (scripts) to act on its outputs, review those scripts separately for install or credential requirements.Like a lobster shell, security has layers — review code before you run it.
latestvk97faxsdfbrp7y4ex5x2cj2cbx83hp9x
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
