Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

enterprise-diagnosis-report

v1.0.0

整合企业基本信息、财税诊断、政策匹配三份报告,生成综合诊断分析报告;当用户需要企业诊断报告汇总、财税分析整合或政策匹配综合分析时使用

0· 92·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for wangl271/enterprise-diagnosis-report.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "enterprise-diagnosis-report" (wangl271/enterprise-diagnosis-report) from ClawHub.
Skill page: https://clawhub.ai/wangl271/enterprise-diagnosis-report
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install enterprise-diagnosis-report

ClawHub CLI

Package manager switcher

npx clawhub@latest install enterprise-diagnosis-report
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (整合企业三份报告并生成综合诊断) align with included artifacts: a PDF parsing script (uses PyMuPDF and requests), a detailed report template, and SKILL.md instructions that describe extracting and consolidating report contents. The declared dependencies are appropriate for PDF download/parse.
Instruction Scope
SKILL.md confines runtime actions to: download or read PDFs, extract text via scripts/pdf_parser.py, and organize/extract information according to references/report_template.md. It does not direct the agent to read unrelated system files, access environment secrets, or transmit extracted data to external endpoints beyond fetching PDFs.
Install Mechanism
No install spec is provided (instruction-only plus included script). No remote downloads or installers are executed by the skill itself. Dependencies are standard Python packages declared in SKILL.md (PyMuPDF, requests).
Credentials
The skill requests no environment variables, credentials, or config paths. The operations (downloading and parsing PDFs) do not require secrets by design.
Persistence & Privilege
always:false and default invocation settings are used. The skill does not request persistent privileges, modify other skills, or alter system-wide agent settings.
Assessment
This skill appears to do what it claims: download or read PDFs, extract text, and help you produce a consolidated diagnosis. Before using it, consider: (1) Provide only PDFs you trust—the script will download arbitrary URLs, which could be used to request internal/internal‑only endpoints (SSRF risk) if you supply internal URLs. (2) The included parser extracts text but does not perform OCR on scanned images—manually verify tables/numbers. (3) The agent or script will process potentially sensitive financial data—avoid submitting confidential reports unless you trust the execution environment. (4) If running locally or in a shared environment, review scripts/pdf_parser.py and install dependencies (PyMuPDF, requests) in an isolated environment (virtualenv/container). (5) No external data exfiltration endpoints are hard-coded in the skill, but always review any outputs before sharing externally.

Like a lobster shell, security has layers — review code before you run it.

latestvk976hds7nc0b7h2kwt656v2egs83rd08
92downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

企业诊断报告综合分析

任务目标

  • 本Skill用于:整合企业三份核心诊断报告(基本信息、财税诊断、政策匹配),生成综合分析报告
  • 能力包含:PDF报告解析、关键信息提取、数据交叉验证、综合分析报告生成
  • 触发条件:用户提供企业诊断相关的多份报告文件(PDF格式)需要整合分析

前置准备

  • 依赖说明:scripts脚本所需的依赖包及版本
    PyMuPDF==1.23.26
    requests==2.31.0
    

操作步骤

标准流程

步骤1:报告文件解析

  • 调用 scripts/pdf_parser.py 分别解析三份PDF报告
  • 执行方式:
    python scripts/pdf_parser.py --url "<PDF_URL_1>" --output "./output/report1.txt"
    python scripts/pdf_parser.py --url "<PDF_URL_2>" --output "./output/report2.txt"
    python scripts/pdf_parser.py --url "<PDF_URL_3>" --output "./output/report3.txt"
    
  • 参数说明:
    • --url:PDF文件的URL地址或本地路径(必填)
    • --output:提取内容的保存路径(选填,不指定则输出到控制台)

步骤2:关键信息提取 根据 references/report_template.md 中的结构要求,智能体将从三份报告中提取关键信息:

  1. 企业基本信息板块(从第一份报告提取)

    • 企业基本资料:名称、成立时间、注册资本、经营范围
    • 股东及股权结构
    • 管理团队情况
    • 经营状况概览
  2. 财税诊断板块(从第二份报告提取)

    • 财务指标分析:营收、利润、资产负债率等
    • 税务状况分析
    • 财税风险点识别
    • 优化建议
  3. 政策匹配板块(从第三份报告提取)

    • 适用政策清单
    • 补贴申请可行性评估
    • 申报时间节点
    • 预计可获得支持

步骤3:数据交叉验证

  • 对比三份报告中的共同数据点(如企业名称、统一社会信用代码等)
  • 识别数据不一致之处
  • 标注需要用户确认的差异项

步骤4:综合报告生成

  • 按照 references/report_template.md 的格式要求生成综合诊断报告
  • 报告结构:
    一、企业概况
    二、财务健康度分析
    三、税务合规性评估
    四、政策红利与补贴机会
    五、综合诊断结论与建议
    
  • 输出格式:Markdown文档,保存至当前工作目录

可选分支

  • 当报告数据存在冲突时:生成差异对比表,提示用户确认
  • 当某份报告缺失时:标注缺失项,继续分析已有内容
  • 当需要深入分析时:根据用户指令对特定板块进行扩展分析

资源索引

注意事项

  • PDF解析后需人工核对关键数据准确性,特别是表格和数字信息
  • 政策匹配信息时效性强,需标注报告生成时间并提醒用户核实最新政策
  • 财税数据涉及企业敏感信息,报告生成后注意保密
  • 若PDF包含扫描图片,文字识别准确率可能受限,需特别标注

使用示例

示例1:标准三报告整合

用户:请整合这三份企业诊断报告
      报告1:[企业基本信息报告URL]
      报告2:[财税诊断报告URL]
      报告3:[政策匹配报告URL]

执行流程:
1. 调用脚本解析三份PDF
2. 提取关键信息并分类
3. 交叉验证数据一致性
4. 生成综合诊断报告Markdown文档

示例2:部分报告分析

用户:分析这份财税诊断报告

执行流程:
1. 调用脚本解析PDF
2. 提取财税关键指标
3. 生成财务健康度分析报告
4. 标注缺失的企业基本信息和政策匹配内容

Comments

Loading comments...