Olo Dcf Valuation
v1.0.0DCF valuation methodology for M&A due diligence — projections, sensitivity analysis, and terminal value calculation
⭐ 0· 420·2 current·2 all-time
byAleksander Niebylski@aniebyl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (DCF valuation for M&A) match the SKILL.md content: projections, WACC, terminal value, sensitivities, and M&A-specific adjustments. The skill does not request unrelated binaries, env vars, or config paths.
Instruction Scope
SKILL.md contains only finance modeling guidance, validation checks, default assumptions, and required outputs. It does not instruct the agent to read system files, environment variables, or post data to external endpoints outside the described valuation workflow.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing will be written to disk or downloaded during install.
Credentials
No environment variables, credentials, or config paths are requested. The guidance relies purely on user-supplied financial inputs, which is proportionate to the purpose.
Persistence & Privilege
always:false and default invocation settings. The skill does not request elevated or persistent system privileges and does not modify other skills or agent-wide configs.
Assessment
This skill is a textual DCF methodology and appears coherent and low-risk technically because it requests no installs or credentials. Before installing: 1) remember it’s guidance — validate all inputs and results with a proper spreadsheet or finance tool before making decisions; 2) avoid feeding confidential raw datasets into any third-party agent unless you trust its runtime and data handling; 3) double-check jurisdictional assumptions (tax rates, discount rates) and that the agent performing calculations implements numeric conversions (units: dollars vs millions) correctly; and 4) if you need audited or legally binding valuations, use a human expert or verified software rather than relying solely on this skill.Like a lobster shell, security has layers — review code before you run it.
latestvk971d6cy5y9b1q8tc66d9qaeq1825cwv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
