Cleanup Dashboards
v1.0.0Audit and consolidate HubSpot reporting dashboards. Identifies unused, duplicate, or outdated dashboards. Must be performed manually — no dashboard API is av...
⭐ 0· 73·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md instructions: a manual HubSpot dashboard audit. The skill requests no binaries, env vars, or installs and does not attempt to perform actions beyond what a human would do in the HubSpot UI.
Instruction Scope
Runtime instructions are limited to manual UI steps, inventorying dashboards in a spreadsheet, and taking screenshots/notes before deleting. There are no instructions to read unrelated files, exfiltrate data, call external endpoints, or perform system-level actions.
Install Mechanism
No install spec or code files are present; this is instruction-only, so nothing will be written to disk or executed by the agent beyond following the prose guidance.
Credentials
The skill reasonably expects HubSpot portal access with dashboard management permissions but does not request any environment variables or secrets. No unrelated credentials or config paths are required.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges. It does not modify other skills or system-wide settings.
Assessment
This skill is a manual checklist and appears internally consistent. Before using it: ensure you (or the person acting) have appropriate HubSpot dashboard management permissions; back up or document dashboards and reports (export lists, take screenshots) because deletions may be irreversible; confirm ownership and get stakeholder sign-off before removing dashboards, and test the workflow on a small set first. No code or secrets are required by the skill itself, so the main risk is human error (accidental deletion) — follow your org's change-control and data-retention policies.Like a lobster shell, security has layers — review code before you run it.
latestvk97ff8zd3anv027c29hs21vr1583nw0t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
