Valuation Comps

v1.0.0

Comparable company analysis (comps) and business valuation for startups and private companies. Build trading comps, transaction comps (M&A precedents), and D...

0· 103·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name and description (comps, DCF, transaction comps, VC method) align with the SKILL.md content. The data sources and metrics it references (EDGAR, PitchBook, CapIQ, Crunchbase, multiples, EV formulas) are appropriate and expected for a valuation tool.
Instruction Scope
SKILL.md contains procedural guidance for selecting peers, calculating multiples, and running DCF/VC methods. It does not instruct the agent to read local system files, request unrelated environment variables, or transmit data to unexpected endpoints. It appropriately calls out limitations (not for formal 409A or audit-grade opinions).
Install Mechanism
No install spec or code files are present; this is instruction-only, which is the lowest-risk install scenario and consistent with the skill's stated purpose.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. Its referenced external data providers (PitchBook, CapIQ) normally require paid credentials, but the skill does not request or embed any secrets by itself, which is proportionate.
Persistence & Privilege
Flags show default autonomy (disable-model-invocation:false) and always:false. The skill does not request permanent system presence or to modify other skills/config; this is appropriate for its functionality.
Assessment
This appears coherent and instruction-only: it won't install code or request credentials by itself. Before using, keep in mind: (1) the skill is not a substitute for licensed 409A appraisals or audit opinions; (2) if you integrate paid data providers (PitchBook/CapIQ/Crunchbase) you'll need to provide credentials — only supply those if you trust the skill and keep them scoped; (3) avoid entering sensitive, non-essential company secrets into free-text prompts; and (4) review any outputs before sharing externally (financial models can be sensitive and require human review).

Like a lobster shell, security has layers — review code before you run it.

latestvk974cj7h12my03ve7dvhh0yyjx833e3p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments