CRM

v0.1.0

提供CRM管理的可落地指南与SOP。在开展CRM管理相关工作时调用。

0· 198·2 current·2 all-time
byClawKK@codekungfu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description claim CRM management guidance; the SKILL.md contains CRM data models, segmentation, automation patterns, metrics, and compliance notes which align with that purpose. No unrelated dependencies or credentials are requested.
Instruction Scope
SKILL.md is high-level guidance/SOP text only. It does not direct the agent to run commands, read files, access environment variables, or transmit data to third-party endpoints. It stays within the stated purpose.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing will be downloaded or written to disk by installation.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is proportionate to its stated role as a documentation/SOP helper.
Persistence & Privilege
always is false and the skill does not request elevated or persistent system presence. Autonomous invocations are permitted by default but are not combined with broad access or hidden capabilities.
Assessment
This skill is a static set of CRM guidelines/SOPs and appears internally consistent and low-risk. Before relying on it in production: (1) verify the skill's author/source if you need vetted, organization-specific procedures; (2) when you implement automation from these guidelines, ensure any integrations (email/SMS/enterprise IM, databases) use least-privilege credentials and secure storage — the skill itself does not provide or request those; (3) validate compliance and data-protection steps (consent, encryption, retention) against your local regulations and internal policies; (4) if you need the agent to perform real CRM actions, prefer a skill that explicitly declares required API keys and integration endpoints so you can review them.

Like a lobster shell, security has layers — review code before you run it.

latestvk973zh2vpwd3tdpawwqcmptdx983ek46

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments