Okr Consulting
v1.0.1Manage, consult on, and optimize OKRs (Objectives and Key Results). Use when helping set, track, review, score, or improve OKRs. Covers OKR philosophy, commo...
⭐ 0· 348·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (OKR consulting) match the content: playbooks, templates, prompts, and facilitation guidance. Nothing requested (no env vars, no binaries, no config paths) appears extraneous to this purpose.
Instruction Scope
SKILL.md and reference files provide guidance and prompts for running OKR cadences, scoring, workshops, and visualizations. They do not instruct reading local files, accessing environment variables, executing binaries, or contacting hidden endpoints. Mentions of posting updates to Slack/Discord/Telegram are examples/templates, not configured external endpoints.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded during installation.
Credentials
The skill requests no credentials, environment variables, or config paths. All guidance is informational and does not require secrets or elevated access.
Persistence & Privilege
always is false and disable-model-invocation is false (normal). The skill does not request persistent system-wide privileges or modify other skills' configs.
Assessment
This is an instruction-only OKR playbook with no code, installs, or secret access — low risk and internally consistent. Before installing, confirm you trust the publisher (source is unknown) because instruction-only skills can still produce recommendations that you or an agent might post into your org channels; if you let the agent post to Slack/Discord/Telegram, ensure those integrations are authorized and review messages before posting. If you see future versions that add an install script, required env vars, or network endpoints, re-check — those would change the risk profile.Like a lobster shell, security has layers — review code before you run it.
latestvk97asn92b32m6bahbntantt2xs820vw2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
