Blocked Page Fallback

v1.0.0

Recover when a web page is thin, blocked, JS-heavy, region-limited, or fetch-incompatible by switching to lawful fallback paths instead of stopping early.

0· 50·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (recover when a page is blocked or JS-heavy) matches the instructions (broaden discovery, switch transport, pivot sources, use caches/archives). Nothing requested (no env vars, no installs) is disproportionate to this purpose.
Instruction Scope
SKILL.md stays focused on discovery strategies and explicitly forbids bypassing logins, anti-bot controls, and brute force. It asks the agent to search multiple engines, site-specific search, use archives, sitemaps, APIs, and browser-rendered fetches — all directly relevant. Note: it assumes the agent has a browser-rendering capability/tool available, but does not instruct any unauthorized data access.
Install Mechanism
Instruction-only skill with no install spec or external downloads; lowest-risk installation footprint.
Credentials
No environment variables, credentials, or config paths are requested. The absence of requested secrets is proportional and appropriate for the described functionality.
Persistence & Privilege
always:false and normal autonomous invocation are used (platform default). The skill does not request permanent presence, system modifications, or access to other skills' configs.
Assessment
This skill appears coherent and low-risk: it only describes lawful fallback search strategies and explicitly forbids bypassing protections. Before installing, confirm that your agent runtime provides a safe browser-rendering tool (headless browser) if you expect the 'browser-rendered path' to be used, and that any network access to third-party sites complies with your privacy and logging policies. If you need access to login-protected content, supply explicit user-authorized first-party credentials or APIs rather than letting the agent attempt workarounds.

Like a lobster shell, security has layers — review code before you run it.

latestvk973wcv7h17prm3zh3hbytn46n83vjty

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments