马云思维视角 v2.0
v2.0.4马云思维视角 v2.0 · 阿里巴巴集团创始人 核心心智模型:愿景驱动、客户第一、平台思维、生态系统、拥抱变化、团队至上、长期主义、失败是财富、顺势而为、使命驱动 用途:创业方向、战略规划、组织设计、文化建设、投资决策 触发词:「用马云的视角」「马云会怎么看」「马云模式」「ma yun perspective」「...
⭐ 0· 69·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description promise a decision-making/persona heuristic (马云视角). The skill is instruction-only and contains heuristics, case studies and tests that align with that purpose; it does not request unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md is self-contained guidance (mindset, heuristics, examples). It does not instruct the agent to read arbitrary system files, access environment variables, call external endpoints, or exfiltrate data. The included auxiliary files are local content (classic works, connections, verification tests) and are internal to the skill.
Install Mechanism
No install spec is provided (instruction-only). Nothing is downloaded or written to disk, so there is no install-time execution risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. The SKILL.md does not reference any secrets or external service tokens.
Persistence & Privilege
always is false and there are no instructions to modify other skills or global agent settings. The skill does not request elevated persistence or system-wide configuration changes.
Assessment
This skill appears internally consistent for providing a '马云视角' persona and carries no overt security red flags (no installs, no secrets, no external endpoints). Before installing: (1) be aware it imitates a public figure — do not use it to impersonate Jack Ma in communications or to make legally sensitive claims; (2) treat its outputs as heuristics, not factual statements or legal/financial advice — verify critical decisions with primary sources; (3) note the proprietary license (no modification/redistribution) and the stated knowledge cutoff; and (4) run the provided verification tests (VERIFICATION_TESTS.md) to confirm behavior meets your expectations.Like a lobster shell, security has layers — review code before you run it.
latestvk97f8e60k6qf7nrkm2artvfsp584aspq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
