Douyin Trend Finder
v1.0.0抖音热点追踪、BGM 发现、话题分析、爆款视频拆解。适合短视频创作者、品牌运营、MCN 机构。
⭐ 0· 122·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (抖音热点/BGM/话题分析) align with the declared runtime needs: python3, curl and the pip 'requests' dependency are plausible for fetching and analyzing web data. The presence of both curl and python3/requests is slightly redundant but not disproportionate.
Instruction Scope
SKILL.md is high-level and does not specify concrete data sources, API endpoints, or exact steps; it gives the agent broad discretion to retrieve and analyze public Douyin content (e.g., web scraping, third‑party APIs). That vagueness increases risk surface (unexpected network access, potential TOS violations) even though no explicit instruction to read local files or env vars exists.
Install Mechanism
This is instruction-only; the only declared install step is pip install requests. No binaries or external archives are downloaded. Low installation risk.
Credentials
No credentials, no config paths, and no secret environment variables are requested. Required binaries (python3, curl) are proportionate to the stated purpose.
Persistence & Privilege
always is false and autonomous invocation is default (not a concern by itself). The skill does not request persistent system-wide changes or access to other skills' configs.
Assessment
This skill appears coherent for finding Douyin trends and needs only standard web-request tooling. Before installing: 1) confirm you trust the skill source (GitHub homepage is generic), 2) ask the author how it fetches Douyin data (official API, third‑party API, or web scraping) because scraping can violate platform TOS and may require additional permissions, 3) be aware it may perform network requests — avoid sending private credentials or unpublished content, and 4) consider running it in a sandboxed environment or requesting more specific runtime details (endpoints, data handling, and retention) if you need stronger assurance.Like a lobster shell, security has layers — review code before you run it.
latestvk97293awtyy3anzrm5yqkznwms83k357
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎵 Clawdis
Binspython3, curl
