OKR & Strategy Execution Engine
v2.0.0Complete OKR & Strategy Execution system — from company vision to weekly execution. Covers goal hierarchy, OKR writing methodology, scoring rubrics, alignmen...
⭐ 0· 942·1 current·2 all-time
by@1kalin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md and README content: both provide OKR methodology, templates, rituals, and rubrics. There are no requests for unrelated capabilities (cloud credentials, system access, or unrelated APIs).
Instruction Scope
SKILL.md contains procedural guidance, YAML templates, rubrics, and agendas. It does not instruct the agent to read system files, access environment variables, contact hidden endpoints, or exfiltrate data. Instructions remain within the stated domain of planning and goal-setting.
Install Mechanism
No install spec or code files are present — this is an instruction-only skill. The README mentions 'clawhub install' (expected for the platform) but there are no downloads, archives, or external install URLs in the package itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. Nothing in the instructions demands secrets or unrelated credentials.
Persistence & Privilege
always is false and model invocation is permitted (platform default). The skill requests no persistent system changes or cross-skill configuration. No elevated privileges requested.
Assessment
This skill is an instruction-only OKR playbook and appears coherent: it does not ask for credentials or install code. Before installing, verify the publisher if you care about provenance (owner ID is an opaque string and README links to a third-party site). Be aware the skill may generate templates or ask for business data — avoid pasting secrets or confidential documents into prompts. If you plan to act on the skill's recommendations for real company decisions, cross-check outputs with your leadership and finance teams. Finally, watch for any later versions that add install behavior or require external API keys; that would change the risk profile.Like a lobster shell, security has layers — review code before you run it.
alignmentvk97a75pecnhhd9g27ngvmk4szd81m5zvgoalsvk97a75pecnhhd9g27ngvmk4szd81m5zvkey-resultsvk977s4604tf5cthgeayqd5fxtd81dp0skpivk97a75pecnhhd9g27ngvmk4szd81m5zvlatestvk97a75pecnhhd9g27ngvmk4szd81m5zvobjectivesvk97a75pecnhhd9g27ngvmk4szd81m5zvokrvk97a75pecnhhd9g27ngvmk4szd81m5zvplanningvk97a75pecnhhd9g27ngvmk4szd81m5zvquarterlyvk97a75pecnhhd9g27ngvmk4szd81m5zvstrategyvk97a75pecnhhd9g27ngvmk4szd81m5zv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
