Founder Playbook
v1.0.0Decision validation and thinking frameworks for startup founders. Use when you need to pressure-test a decision, validate your next steps, think through stra...
⭐ 0· 657·2 current·2 all-time
by@xeroc
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (founder decision frameworks, fundraising, crypto/web3 considerations) match the provided content. The skill does not request unrelated binaries, credentials, or system access.
Instruction Scope
SKILL.md and the reference files are coaching frameworks and question banks. The runtime instructions are limited to conversational behavior (questions, framing, modes). There are no instructions to read system files, access environment variables, or transmit data to external endpoints.
Install Mechanism
No install spec and no code files—this is instruction-only, so nothing will be written to disk or downloaded during install.
Credentials
The skill declares no required environment variables, credentials, or config paths. The included crypto/web3 content is topical and does not require network credentials.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or modify other skills. Autonomous invocation (model calls the skill) is allowed by default but not elevated here.
Assessment
This skill is internally consistent and appears to be a content-only coaching tool. Because it runs as an instruction-only skill, it will not install code or ask for credentials—but any time you share personal or business-sensitive details with an LLM/skill, treat those as potentially persisted in logs: avoid pasting secrets, private keys, or confidential docs. The skill contains dated statistics (last updated Nov 2025); verify any financial, legal, or regulatory recommendations with up-to-date sources or a qualified professional before acting. If you need the agent to interact with external services, expect that to require separate, explicit credentials and a different skill with a higher-risk footprint.Like a lobster shell, security has layers — review code before you run it.
latestvk978vdwca1z5p0epg3wwdw49qh81946k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
