Service Dominant Business Model Design 服务主导逻辑商业模式设计
v1.0.0服务主导逻辑下的价值共创商业模式设计方法。用于:当需要为特定领域及产品设计以服务为中心、多方价值共创的商业模式时
⭐ 0· 275·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and included documents all describe service‑dominant logic and business‑model design; there are no unexpected requirements (no env vars, binaries, or config paths) that would be unrelated to that purpose. Note: the package source/homepage is missing (owner ID only), but that does not create any technical incoherence.
Instruction Scope
SKILL.md and reference files contain methodologies, templates, checklists, and workshop steps only — they do not instruct the agent to read system files, access environment variables, contact external endpoints, or exfiltrate data.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is written to disk or executed by the platform during install.
Credentials
The skill requires no environment variables, credentials, or config paths; there are no secret- or credential-related demands that would be disproportionate for a design-methodology skill.
Persistence & Privilege
always is false and there is no mechanism for the skill to persist configuration or modify other skills; normal autonomous invocation is allowed by platform default but the skill itself has no elevated privileges.
Assessment
This skill appears coherent and low‑risk: it only supplies frameworks, templates, and workshop steps for designing service‑centric business models and does not request permissions or install code. Before enabling it, you may want to: (1) skim the SKILL.md to confirm the guidance meets your needs, (2) note that the source/homepage is unspecified (owner ID only) — if provenance is important to you, ask the publisher for credentials or citations, and (3) when allowing autonomous invocation, avoid granting your agent unrelated data access (sensitive company data, credentials, or documents) unless you intentionally want the skill to operate on them.Like a lobster shell, security has layers — review code before you run it.
latestvk97c6bs5580fya9k2nganhc7ds82knp1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
