Review Miner
v1.0.0从评论、评价和反馈中提炼卖点、痛点、反对意见与应删除的话术。;use for reviews, voice-of-customer, marketing workflows;do not use for 造假好评, 泄露用户身份.
⭐ 0· 80·0 current·0 all-time
byvx:17605205782@52yuanchangxing
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (提炼卖点/痛点/反对意见) align with provided files: a resources spec, template, examples, and a Python script that performs CSV/text/directory audits and emits structured markdown. Requiring only python3 is proportionate.
Instruction Scope
SKILL.md instructs running the local Python script or falling back to bundled templates; it warns about privacy and not to fake reviews. The included script supports file, CSV, directory, pattern, and skill-audit modes and will read many text file types recursively when given a directory. That behavior is useful for directory-audit use cases but expands scope beyond strictly 'comments CSV' inputs — users should avoid pointing it at broad system directories or sensitive locations.
Install Mechanism
No install spec; this is instruction+script only and relies on the system python3. Nothing is downloaded or extracted from external URLs and no package registries are referenced.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The script does not attempt to read environment secrets or require external API keys.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request permanent presence or modify other skills. The tool is local and only runs when invoked.
Scan Findings in Context
[pattern_detection_rules_in_code] expected: The script embeds regex patterns for detecting dangerous constructs (curl|bash, rm -rf, base64 exec, secret-like tokens, private URLs) and a pattern_audit mode. This is appropriate for a tool that can perform pattern-based audits of text or directories.
Assessment
This skill appears to be what it claims: a local review-mining/audit tool implemented in Python that uses bundled templates and a spec. Before running: (1) Only pass intended inputs (comments CSV, text files) — do not point the tool at system or secret-bearing directories. (2) If your input contains PII or sensitive customer data, desensitize it first (SKILL.md also recommends this). (3) Inspect scripts/run.py yourself if you will run it in an environment with sensitive files; the script reads files recursively when given a directory and can include many file types. (4) The skill does not call external networks or request credentials, but treat outputs that surface potential secrets as sensitive. (5) For production use, run the script in a controlled workspace and review results before any automated publishing or system changes.Like a lobster shell, security has layers — review code before you run it.
latestvk97ck4mz1fn8gpg7cm2cpj6b5n83fezc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⛏️ Clawdis
OSmacOS · Linux · Windows
Binspython3
