CAC Optimizer

v1.0.0

Calculates and benchmarks true customer acquisition cost by channel and cohort, identifies savings opportunities, and builds data-driven CAC reduction plans.

0· 611·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (CAC calculation, benchmarking, reduction playbook) matches the SKILL.md content. There are no unrelated requirements (no env vars, binaries, or config paths) that would be incoherent for this purpose.
Instruction Scope
The SKILL.md contains frameworks, formulas, templates, and output formats for CAC analysis. It does not instruct the agent to read system files, access unrelated credentials, or transmit data to external endpoints; it expects the agent or user to supply financial/CRM data as input.
Install Mechanism
No install spec or code files are included (instruction-only), so nothing will be written to disk or fetched at install time.
Credentials
No environment variables, credentials, or config paths are requested. The computations described legitimately require internal business data (revenue, spend, headcount) but the skill does not request access to those systems itself.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed. That default autonomy is not combined with other red flags here.
Assessment
This instruction pack is coherent and benign: it provides formulas, benchmarks, and playbooks but does not include code or request credentials. Before using it, be mindful that accurate CAC calculations require sensitive financial and CRM data — only provide the minimum necessary data to the agent, use least-privilege connectors when granting access to accounting/CRM systems, and verify any external links or commercial offers in the README before following them. If you plan to let an autonomous agent pull data from production systems, review agent permissions and audit logs first.

Like a lobster shell, security has layers — review code before you run it.

cacvk97a4tfswby3yjhsvjbg6cap8x818d5mcustomer acquisitionvk97a4tfswby3yjhsvjbg6cap8x818d5mgrowthvk97a4tfswby3yjhsvjbg6cap8x818d5mlatestvk97a4tfswby3yjhsvjbg6cap8x818d5mmarketingvk97a4tfswby3yjhsvjbg6cap8x818d5msalesvk97a4tfswby3yjhsvjbg6cap8x818d5munit economicsvk97a4tfswby3yjhsvjbg6cap8x818d5m

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments