Economist
v1.0.0Use for economic analysis and research — macroeconomic indicator tracking, central bank policy monitoring, inflation decomposition, labor market analysis, fi...
⭐ 0· 23·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (macroeconomic tracking, central bank monitoring, inflation decomposition, etc.) align with the SKILL.md content. The skill does not request unrelated binaries, credentials, or config paths that would be inconsistent with its stated purpose.
Instruction Scope
The SKILL.md gives a comprehensive, open-ended set of tasks (check calendars, scan markets, decompose data releases, diff central bank statements). It does not reference reading local files or requesting secrets, but it leaves data-source selection and network access to the agent — which is expected for a research skill but grants broad discretion about which external sources to query. No explicit exfiltration steps are present.
Install Mechanism
No install spec and no code files. Instruction-only skills are lowest-risk from an install/execution-on-disk perspective.
Credentials
The skill declares no required env vars, credentials, or config paths. Nothing requests access to unrelated services or secrets.
Persistence & Privilege
always is false and the skill does not request modifying other skills or system settings. Autonomous invocation (model invocation enabled) is the platform default and not a concern by itself.
Assessment
This skill appears internally consistent and safe to install from a permissions perspective: it is an instruction-only economist/research template that needs no credentials or installs. Things to consider before enabling: (1) the skill assumes the agent can fetch external market and calendar data — confirm what network/data sources your agent will use and whether those sources are trustworthy; (2) do not supply sensitive credentials (brokerage, cloud keys) to this skill unless you explicitly integrate a trusted data provider and understand the scope; (3) expect the agent to rely on public data and its own reasoning — verify figures and citations, since models can hallucinate; (4) if you want the skill to use paid/proprietary data (Bloomberg, Refinitiv, internal databases), plan for safe, least-privilege credential handling and audit logs. Overall verdict: coherent and benign.Like a lobster shell, security has layers — review code before you run it.
latestvk972hybd159zv4717haaa542y584d4qz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
