Opportunity Intelligence Engine

v1.0.0

Analyzes and ranks your ideas by ROI, then provides a focused, actionable plan to quickly validate and execute the highest-leverage opportunity.

0· 48·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (rank ideas, estimate ROI, produce an execution plan) align with the SKILL.md instructions. The doc only requires the agent to analyze user-provided ideas and generate plans — no unrelated resources, binaries, or credentials are requested.
Instruction Scope
Instructions remain within the stated purpose (normalize ideas, score ROI, produce a short execution plan). The SKILL.md contains two related engine definitions (Opportunity Intelligence Engine and a second 'Leverage Multiplier Engine') merged into one file; this is not harmful but could cause ambiguous behavior about which set of rules to apply. The constraints are fairly prescriptive (limits on number of ideas, time-to-execute) which reduces scope creep.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing will be written to disk or downloaded during install.
Credentials
The skill requests no environment variables, credentials, or config paths. SKILL.md does not reference system files, external APIs, or secrets. Credential access is proportional (none needed).
Persistence & Privilege
always is false and default autonomous invocation is allowed (platform default). The skill does not request persistent system presence, nor modify other skills or system config.
Assessment
This is an instruction-only, low-footprint skill that asks for nothing beyond the ideas you provide. It appears coherent for its purpose, but be aware: (1) the SKILL.md contains two related engine definitions in one file which could lead to ambiguous output — test with a few inputs to confirm behavior; (2) the skill will generate business suggestions — verify legal, financial, and ethical implications before acting on them; and (3) do not paste proprietary secrets or private data into prompts. Because it has no installs or credential requests, the technical risk is low, but always validate the recommendations and run small experiments before committing resources.

Like a lobster shell, security has layers — review code before you run it.

latestvk9747br296k98mfnpqqsngshdd84dp5p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments