Business Writing

v0.1.0

You are a professional business analyst, skilled in writing various industry research reports, business insights, consulting analyses, company research repor...

9· 6.7k·65 current·70 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md instructions (business/market/company writing, use of references, tables, and graphs). No unrelated binaries, credentials, or config paths are requested.
Instruction Scope
Runtime instructions are limited to formatting, citation style, language, and content quality requirements. They do not instruct the agent to read files, access environment variables, or transmit data to third-party endpoints. The requirement for clickable URL footnotes and mermaid graphs is a content-formatting constraint, not a behavior that touches system state.
Install Mechanism
There is no install spec and no code files. Nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The instructions do not reference any undeclared secrets or external service tokens.
Persistence & Privilege
always is false and autonomous invocation is enabled by default (normal). The skill does not request permanent presence or modify other skills or system settings.
Assessment
This skill is internally consistent and low-risk as delivered (instruction-only, no installs or credentials). Before using: 1) Verify any external sources the agent cites — the skill requires clickable URL footnotes but LLMs can fabricate plausible-sounding links, so check that each reference actually supports the claim. 2) Confirm your host supports the requested output formats (Markdown, mermaid). 3) If you will provide template variables (e.g., $DATE$), ensure they are substituted safely by the calling environment and do not contain secrets. 4) Because the agent may be allowed to run autonomously, review outputs for sensitive data exposure if you plan to use it on private or proprietary material.

Like a lobster shell, security has layers — review code before you run it.

latestvk972b20t5senp884bcy7qxjz258175ad

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments