Analyste Du Travail
PassAudited by ClawScan on May 1, 2026.
Overview
This is a coherent instruction-only consulting skill with no code or automatic access, but users should handle the internal banking, HR, and interview data it references as sensitive.
Technically, this skill is low risk because it contains only instructions and templates. Before using it, verify that you are allowed to use it for Crédit Agricole work, provide only approved and necessary internal data, anonymize employee comments, avoid customer or personal data unless explicitly authorized, and store resulting reports in access-controlled locations.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A user could assume the skill is official corporate guidance without independent confirmation.
The package is instruction-only and shows no hidden executable behavior, but its provenance is not documented while the content is corporate-specific.
Source: unknown; Homepage: none
Verify the skill owner or organizational approval before using it as official Crédit Agricole material or applying protected brand assets.
A user may need to provide or analyze sensitive internal operational data and employee-related metrics.
The methodology expects use of internal system extracts and HR indicators. This is aligned with the stated diagnostic purpose, but it requires proper authorization and least-necessary access.
Sources à exploiter: Extractions SI (volumes, délais, statuts) ... Données RH (effectifs, absences, turnover)
Use only approved, mission-scoped data; avoid unnecessary personal or customer details; and confirm access rights with the relevant sponsor or data owner.
Sensitive operational details or staff comments could remain in shared documents if the user includes them.
The templates anticipate retaining raw business data and interview verbatims in persistent diagnostic deliverables. The artifact calls for anonymization, but these reports and notes still need access controls and retention limits.
Annexes: B. Données brutes - Tableaux de volumes - Extractions SI; C. Verbatims complets (anonymisés)
Anonymize before sharing, restrict recipients and storage locations, and define retention or deletion rules for raw notes and annexes.
