Strategy Advisor Claw
v1.0.0综合多方数据,给出下一步行动建议的深度私有化战略参谋。激活场景:当用户讨论业务决策、战略方向、市场策略、资源分配、问题诊断、优先级排序、下一步该做什么、怎么办、如何应对某个局面、给个建议、帮我分析、有没有更好的方案、权衡利弊、我们该不该、要不要、接下来怎么走等需要行动建议的场景。核心价值:结合公司真实的经营现状给...
⭐ 0· 94·0 current·0 all-time
byRicky@tujinsama
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (strategy-advisor) aligns with the instructions: ask targeted questions, run a lightweight diagnosis using the provided framework, and produce actionable recommendations. It does not request unrelated credentials, binaries, or system access.
Instruction Scope
SKILL.md defines a clear workflow (diagnose → probe up to 3–5 questions → structured analysis → recommendations). It does not instruct reading local files, environment variables, or contacting external endpoints. Note: the skill expects users to provide company data interactively; users should avoid pasting sensitive credentials or full documents unless they trust the environment.
Install Mechanism
No install spec and no code files — instruction-only; nothing is written to disk or downloaded, which minimizes risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. That matches the described behavior: all inputs are expected to be provided by the user in conversation.
Persistence & Privilege
always is false and it does not request any persistent privileges or modify other skills. Autonomous invocation is allowed by platform default but is not combined with other concerning capabilities here.
Assessment
This skill is instruction-only and appears coherent, but before using it: (1) do not paste secrets, raw credentials, or full sensitive datasets into the chat — instead redact or summarize sensitive details; (2) be mindful that recommendations are only as good as the data you provide, and the skill may ask probing questions to fill gaps; (3) if you need the advisor to access internal systems or files, prefer a controlled workflow (upload sanitized extracts or use secure connectors) rather than pasting credentials into the conversation.Like a lobster shell, security has layers — review code before you run it.
latestvk973w8ggagtnb4xenrkxg6s8gx83my1a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
