Business Intelligence
v1.0.0Model business performance, define KPIs, and turn data into decision-ready dashboards, briefings, and operating cadences for teams and executives.
⭐ 1· 1.2k·10 current·11 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (business intelligence, KPI and dashboard guidance) matches the files and runtime instructions. There are no unrelated environment variables, binaries, or cloud credentials requested.
Instruction Scope
Runtime instructions are limited to producing and reading BI artifacts and a local memory directory (~/business-intelligence/). The SKILL.md explicitly states it will not access files outside that path, will not send data externally, and will not create background automations without explicit confirmation.
Install Mechanism
No install spec and no code files — this is instruction-only. Nothing is downloaded or written to disk by an installer beyond the expected local memory files created by the skill at runtime.
Credentials
The skill requests no environment variables, credentials, or config paths. Memory and persistence are local and scoped to a single directory; the skill also documents not storing secrets.
Persistence & Privilege
The skill writes persistent BI context to ~/business-intelligence/ which is appropriate for its function. It does not request always:true or autonomous installation privileges. Users should be aware this local folder will be created/updated if memory is enabled.
Assessment
This skill appears internally consistent and instruction-only: it stores BI memory and artifacts under ~/business-intelligence/ and claims no external network calls or credential use. Before installing or enabling memory, verify you are comfortable with the agent creating and storing files in your home directory and back up any sensitive local data you do not want mixed into the BI memory. If you later use the suggested related skills (clawhub install ...), review those packages separately — installing them may fetch code from the registry. Finally, if you have organization-wide agent policies, confirm that enabling this skill's memory and proactive prompts matches your privacy rules (but the skill itself does not appear to exfiltrate data or request unrelated privileges).Like a lobster shell, security has layers — review code before you run it.
latestvk9790mh4nksdwx5p16as5mqe2d822277
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
B Clawdis
OSLinux · macOS · Windows
