Drucker
v1.0.4Provides data-driven strategic consulting using McKinsey, Porter, and Drucker frameworks for business analysis, competitive insights, and actionable recommen...
⭐ 0· 120·1 current·1 all-time
byAha.Gare@zrxparley
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is an instruction-only consultant using standard frameworks (SWOT, Porter's Five Forces, McKinsey 7S). It declares no binaries, env vars, or config paths and does not ask for unrelated capabilities; the resources requested (none) align with the described purpose.
Instruction Scope
SKILL.md contains role definition, frameworks, templates, and a consulting workflow. It does not instruct the agent to read system files, environment variables, or send data to external endpoints, nor does it grant open-ended permission to collect unrelated context.
Install Mechanism
No install spec or code files are present; the skill is instruction-only so nothing will be downloaded or written to disk during install.
Credentials
The skill requires no environment variables, credentials, or config paths. There are no requests for secrets or unrelated service tokens, which is appropriate for a purely advisory/templating skill.
Persistence & Privilege
The skill is not marked always:true and uses the platform defaults for invocation. It does not request persistent agent-level privileges or to modify other skills' configurations.
Assessment
This skill is instruction-only and appears coherent for providing strategic analyses and templates. Before installing, remember: (1) it will produce advice based on whatever inputs you provide — do not paste sensitive credentials or proprietary documents into the chat unless you intend them to be processed; (2) validate any factual claims or external data the skill uses (market sizes, competitor names, legal/policy impacts) against authoritative sources before acting; (3) if you later see an update that adds install steps, external downloads, or requests for API keys/credentials, reassess immediately — those would be material changes that could introduce risk.Like a lobster shell, security has layers — review code before you run it.
latestvk97ahse55b7m9jd4jv2jmzpchh84hntm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
