Get Today Connections
v0.1.0Fetch today's NYT Connections puzzle answers and hints. Trigger this skill when the user asks for "today's Connections answers", "today's connections hints",...
⭐ 0· 93·0 current·0 all-time
by@1eif
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description (fetch today's NYT Connections answers and hints) matches the runtime instructions (call a single API endpoint and present the JSON). No unrelated env vars, binaries, or config paths are requested.
Instruction Scope
Instructions only call one external URL (https://connections-answers.com/api/today), parse the returned JSON, and format output. This is within the stated purpose, but it relies entirely on a third‑party API (not the official NYT) so correctness and legality (spoilers/copyright) depend on that external service and its data.
Install Mechanism
No install spec and no code files — instruction-only skill, so nothing is written to disk and no external packages are pulled.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no disproportionate access requested.
Persistence & Privilege
always is false and the skill does not request persistent system changes or elevated privileges. Autonomous invocation is allowed by default but not unusual; no extra privilege is requested.
Assessment
This skill appears coherent and low-risk technically, but consider these practical points before installing: (1) It fetches answers from a third‑party site (connections-answers.com), not the official NYT source — verify you trust that domain and that its content is allowed to be redistributed. (2) The endpoint and JSON schema are hardcoded; if the third‑party changes its API the skill will break or may return unexpected content. (3) The skill will cause the agent to make an outbound network request whenever invoked — if you’re concerned about data leaving your environment, avoid installing or restrict invocation. (4) If you care about copyright or avoiding spoilers for others, check NYT terms and use the skill accordingly. (5) If you want stronger assurances, ask the author for the endpoint's provenance or replace the endpoint with an official source before using.Like a lobster shell, security has layers — review code before you run it.
latestvk978fema4bczd3gy6x6zk9jbt584g9v4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
