Pre Show Competitor Analysis

v0.4.0

Analyze competitor exhibitor presence, booth positioning, and messaging before the show. "Who are my competitors at this show?" / "分析展会竞争对手" / "Messekonkurre...

1· 134·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md content: the skill guides the agent to collect exhibitor lists, floor plans, and public messaging and produce threat scoring and strategy. It does not request unrelated credentials, binaries, or config paths.
Instruction Scope
Runtime instructions are narrowly scoped to pre-show research: read the provided framework file, gather public exhibitor/floor-plan data, tag provenance, and produce structured output. The instructions do not ask the agent to read arbitrary system files, sweep environment variables, or exfiltrate data to unexpected endpoints. They do rely on collecting public data or user-provided show materials (exhibitor lists/floor plans).
Install Mechanism
Instruction-only skill with no install spec, no code files to execute, and no downloads—lowest-risk install posture.
Credentials
No environment variables, credentials, or config paths are required. The declared inputs align with the stated purpose (public show materials and user-supplied context).
Persistence & Privilege
always is false and the skill is user-invocable. Autonomous invocation is allowed (platform default) but there is no special 'always' privilege or requests to modify other skills or system settings.
Assessment
This skill appears coherent and appropriate for pre-show competitive research. Before installing: 1) Be prepared to supply or allow access to the public exhibitor lists, floor plans, and any internal context you want included (do not upload sensitive internal documents unless you intend them to be used). 2) Verify any [INF]/[HEARD]/[EST] claims on-site—the skill explicitly marks these. 3) If you allow autonomous agent runs that can browse the web, ensure you understand what web access the agent has; otherwise run the skill interactively and provide the show materials yourself. 4) If you later extend the skill to fetch private data or require credentials, reassess for proportionality and data-exfiltration risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk9738zqph7sxs39c946wa3c9zh841qkd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments