Interview outline assistant

v1.0.0

资深B端用户访谈专家。帮助完成从提纲设计到复盘报告的完整访谈流程。适用于:设计访谈提纲、撰写邀约话术、访谈模拟演练、生成复盘报告。

0· 61·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (B端访谈提纲、邀约、演练、复盘) match the included workflow files and SKILL.md. There are no unrelated environment variables, binaries, or installs requested that would be inconsistent with an interview assistant.
Instruction Scope
The instructions ask the user/agent to use organizational artifacts (platform data for candidate selection, calendar invites, recordings/transcripts). This is coherent for the purpose, but it implicitly relies on access to internal data and recorded interviews — the skill itself does not request or manage credentials, so any access to company data is expected to be performed by the human/operator or other authorized tooling.
Install Mechanism
Instruction-only skill with no install spec and no code files to execute; lowest risk from install perspective.
Credentials
No environment variables, credentials, or config paths are required. The guidance references organizational data (e.g., backend user lists) but does not request secrets or tokens in-skill.
Persistence & Privilege
always:false and default invocation settings. The skill does not request to modify other skills or system settings and does not ask to persist agent-wide credentials.
Assessment
This skill appears coherent and low-risk as it is instruction-only and asks no credentials. Before using it in practice, ensure: 1) you obtain explicit consent from interviewees for recording/transcription and follow your organization's data-retention and privacy policies; 2) transcripts or recordings containing personal or confidential information are anonymized before sharing with external tools or models; 3) any steps that require access to internal platform data (selecting candidates from backend) are performed by authorized personnel or systems — do not provide credentials to the skill; 4) follow your legal/compliance rules when inviting customers and offering incentives. If you plan to automate steps that touch internal systems, review that automation separately for credentials, logging, and data exfiltration controls.

Like a lobster shell, security has layers — review code before you run it.

latestvk970px48pn47vtv5vthytp9mns83ktzw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments