Ecommerce Return Intelligence
v1.0.0分析退货原因并区分产品问题、预期错配、物流问题和描述问题。;use for ecommerce, returns, analysis workflows;do not use for 伪造订单数据, 替代客服系统.
⭐ 0· 104·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (returns analysis) aligns with the included assets: resources/spec.json, template.md, examples, and scripts/run.py. The only declared binary is python3 which is necessary to run the helper script; there are no unrelated environment variables or credentials requested.
Instruction Scope
SKILL.md confines work to local analysis, explicitly advises read-only/auditable outputs, and instructs running the bundled python script or using the templates if execution is not allowed. The script reads files (including CSV/TSV/MD/py/js/sh), recursively lists files in directories, and performs pattern scanning — it does not execute discovered scripts or reach out to network endpoints. Because the script will read any file/directory the user supplies, users should avoid pointing it at system root or directories containing secrets/credentials.
Install Mechanism
There is no install spec and no network downloads; the skill is instruction+script-only and relies on the Python standard library. No archives or external package installs are performed.
Credentials
The skill requires no environment variables or external credentials. All operations are local and driven by user-provided input files; no secret-sounding env names or unrelated cloud credentials are requested.
Persistence & Privilege
always is false and the skill does not attempt to modify other skills or global agent configuration. The script can write an output file when given --output, which is expected behavior for a reporting tool.
Assessment
This skill appears internally consistent and safe for local use. Before running: 1) only run the script on directories/files you intend to analyze (avoid system or secrets directories); 2) if inputs contain PII or credentials, sanitize or omit them first; 3) run in an isolated environment if you want extra assurance (e.g., container or workspace copy); 4) review scripts/run.py if you want to confirm there are no network calls or unexpected writes (the script only reads files and can write the output file you specify). If you intend to automate actions (writes/notifications/changes) based on its output, treat the skill's output as a human-reviewed draft and implement explicit safeguards before performing external writes.Like a lobster shell, security has layers — review code before you run it.
latestvk978fa2mhtxrcty7bq3fyy1g4s833qbj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📦 Clawdis
OSmacOS · Linux · Windows
Binspython3
