PM Copilot
v0.1.0General product-management copilot that acts as the default entry point for PM work. Use when the user has a broad PM request, mixed product materials, or wa...
⭐ 0· 96·0 current·0 all-time
by@ryanao
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md: it declares a generic PM entrypoint and requires no binaries, credentials, or config paths that would be unrelated to that purpose.
Instruction Scope
SKILL.md contains purely behavioral guidance for classifying PM requests, producing an immediate artifact, and routing to PM sub-skills. It does not instruct the agent to read system files, access environment variables, call arbitrary network endpoints, or exfiltrate data.
Install Mechanism
There is no install spec and no code files; this is instruction-only, so nothing is written to disk or fetched during installation.
Credentials
The skill requests no environment variables, credentials, or config paths. Its declared needs are minimal and proportional to its stated function.
Persistence & Privilege
always is false and there is no indication the skill modifies other skills or system settings. It may autonomously invoke itself or other installed PM sub-skills (the platform default) but that is expected behavior for a router/copilot skill.
Assessment
This skill is internally coherent and low-risk by itself. Key things to consider before installing: (1) It routes to other PM sub-skills when available — review those sub-skills' permissions/requirements because their behavior determines downstream risk. (2) When a user says “just do it,” the skill is allowed to take unilateral actions within the PM domain (drafting specs, summaries, etc.), so plan for human review of any sensitive drafts or decisions. (3) If you see future edits to SKILL.md that add file reads, network endpoints, or required credentials, re-evaluate immediately. If you want extra caution, install but restrict which sub-skills are present or review outputs before applying them externally.Like a lobster shell, security has layers — review code before you run it.
latestvk97fwtwbcdzfgfp72p297sdxtx83nta5pmvk97fwtwbcdzfgfp72p297sdxtx83nta5prdvk97fwtwbcdzfgfp72p297sdxtx83nta5product-managementvk97fwtwbcdzfgfp72p297sdxtx83nta5workflowvk97fwtwbcdzfgfp72p297sdxtx83nta5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
