Guides identifying, prioritizing, selecting platforms, and architecting scalable business automations using ROI, ICE-R scoring, and workflow design principles.
Security Analysis
high confidenceThis skill is an instruction-only automation strategy guide whose requirements and instructions are consistent with its stated purpose and do not request unexpected system access or credentials.
The name/description (business automation strategy, ROI/ICE-R scoring, workflow design) matches the provided SKILL.md and README content. No binaries, credentials, or platform-specific integrations are required by the skill itself, which is appropriate for a methodology/playbook.
SKILL.md is a platform-agnostic methodology with templates, scoring, decision trees, and blueprints. It does not instruct the agent to read system files, access environment variables, or transmit data to hidden endpoints. Its runtime behavior is limited to taking user-provided process information and producing recommendations/templates.
There is no install spec or code to download; the skill is instruction-only. This is the lowest-risk install mechanism and nothing will be written to disk by the skill itself.
The skill declares no required environment variables, credentials, or config paths. That aligns with its purpose as a strategy/playbook that operates on user-supplied information.
The skill is not marked always:true and does not request persistent system-level privileges. It contains no instructions to modify other skills or system settings.
Guidance
This skill is a content-only automation methodology and appears coherent with its description. It does not require credentials or install code. Before using it: (1) avoid pasting sensitive secrets, PII, or credentials into prompts when asking the skill to 'audit' processes; (2) treat external links (e.g., paid 'context packs' in the README) as normal marketing — verify those domains independently before visiting or paying; and (3) if you later follow any build instructions produced by this skill (e.g., deploying automation to n8n, Zapier, or custom code), review those generated workflows and any connectors for the usual security considerations (credentials, least privilege, approvals).
Latest Release
v1.0.1
- Added comprehensive methodology for business automation, from audit to workflow architecture. - Introduced detailed process inventory and ROI calculation templates for automation audits. - Included prioritization strategies using ICE-R scoring and clarified quick win vs. complex automations. - Provided platform decision matrix, selection decision tree, and cost comparison for automation tools. - Added workflow blueprint template and seven core workflow design principles for robust automation design.
Popular Skills
Published by @kangrl-claw on ClawHub