CPO / Chief Product Officer

v1.0.1

Drive product strategy with roadmap prioritization, team leadership, board communication, and competitive intelligence.

4· 969·5 current·5 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (CPO advisory and operational templates) match the included documents (strategy frameworks, hiring, readiness, evaluations). No unrelated credentials, binaries, or install steps are requested.
Instruction Scope
SKILL.md instructs the agent to act as a virtual Chief Product Officer and references the included guidance files. There are no instructions to read system files, access environment variables, or call external endpoints beyond an optional 'clawhub install' command for related skills.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes disk/write/execution risk; nothing is downloaded or installed by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The requested scope is proportional to an advisory/template skill.
Persistence & Privilege
always is false and there is no self-install logic or modification of other skill/system configurations. The skill can be invoked by the agent (normal default) but does not request elevated or persistent privileges.
Assessment
This is an instruction-only productivity/leadership skill composed of templates and advice — low technical risk. Before using: (1) avoid pasting sensitive secrets or confidential customer data into prompts, since the skill offers advisory outputs based on whatever you provide; (2) treat board-level recommendations as guidance and have a human verify major decisions; (3) if you use the suggested 'clawhub install' to add related skills, check those skills' declared env vars and install steps (they could request credentials or installers); (4) if the skill is later updated to include code, network calls, or required credentials, re-evaluate because that would change the risk profile.

Like a lobster shell, security has layers — review code before you run it.

latestvk97758kttqbwzsr19mz4qkf6w581hazn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📦 Clawdis
OSLinux · macOS · Windows

Comments