McKinsey Presentation Generator
v1.0.0McKinsey consulting-style multi-page HTML presentation generator. Creates data-rich, visually compelling slide decks with rigorous research, SVG charts, and...
⭐ 1· 239·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (McKinsey-style presentation generator) align with the SKILL.md: detailed research → plan → HTML slide generation workflow. There are no unrelated required binaries, environment variables, or config paths.
Instruction Scope
Instructions require extensive web research (many targeted searches, 15+ data points, 5+ sources, capture of URLs and dates). This is expected for the stated purpose, but it implicitly requires web access or browsing tools; the skill does not define how to perform or limit network activity. The SKILL.md also references a deployment step using `deploy_html_presentation` without defining that tool or endpoint, which is ambiguous and could lead to attempts to upload/publish outputs if the agent has connectivity or upload tools.
Install Mechanism
No install spec and no code files are present — instruction-only skills have minimal footprint and nothing is written to disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The research-heavy instructions only reference publicly available sources and do not request secrets; this is proportionate to the task.
Persistence & Privilege
always:false and normal autonomous invocation are used. The skill does not ask to persist configuration or modify other skills. Autonomous invocation is allowed by default and is not, by itself, problematic here.
Assessment
This skill appears coherent and does not request credentials or install code, but note a few practical points before installing: (1) The skill expects the agent to perform extensive web research — ensure you only enable it in an agent that has controlled, intended internet access (and that you trust any browsing plugin it may use). (2) The deployment step calls an undefined `deploy_html_presentation`; confirm what mechanism or endpoint will be used to publish files so you don’t accidentally upload sensitive content to an unknown location. (3) The skill aims to reproduce a consulting firm style; be aware of trademark/branding/legal considerations if you reuse deliverables. (4) Avoid including confidential internal data in prompts unless you know where outputs will be stored or published.Like a lobster shell, security has layers — review code before you run it.
latestvk977m5etq0zz50cv6hp844rt1d83mejt
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
