方洪波思维视角 v2.0

v2.0.0

以方洪波董事长视角,提供职业经理人典范的战略决策、组织重构、数字化转型及全球化运营指导。

0· 77·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description promise (produce advice from 方洪波’s perspective on strategy, org change, digital transformation, globalization) matches the SKILL.md content and supporting files; nothing requested (no env vars, no binaries, no config paths) is out of scope.
Instruction Scope
Runtime instructions constrain behavior to producing first‑person advice in a defined style and list test cases/works; they do not instruct reading system files, accessing environment variables, calling external endpoints, or transmitting user data.
Install Mechanism
No install specification and no code files to run — the skill is purely instruction/text-based, so nothing is written to disk or downloaded during install.
Credentials
The skill requires no credentials or environment variables; requested privileges are minimal and proportionate to an advice/persona skill.
Persistence & Privilege
always is false, autonomous invocation is allowed (the platform default) and appropriate for a conversational persona; the skill does not request persistent system-wide changes or access to other skills' configs.
Assessment
This skill is internally consistent and low-risk from a system-security perspective because it only contains text instructions for adopting a managerial persona and has no installs or credential requests. Before using it for real decisions, remember: (1) outputs are the model’s synthesis, not direct quotes from 方洪波 — verify facts and legal/financial advice independently; (2) the SKILL-header states a proprietary license — check any licensing/usage restrictions if you plan to redistribute or embed the material; (3) if future versions add install scripts, environment variables, or external endpoints, stop and re-evaluate for possible data access or exfiltration. If you want higher assurance, request evidence of sourcing for the quoted materials or a provenance statement from the publisher.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ccy2axbztz3b2pj9gpyy16584ajwf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments