Textin Parse

v1.0.0

Textin 文档解析 API 封装,支持上传图片/pdf/word/html/excel/ppt/txt 等格式进行版面检测、文字识别、表格识别,生成 markdown 文档及结构化数据。 用于:(1) 解析 PDF/图片/文档为 markdown;(2) 提取文档结构化数据;(3) 识别表格和公式;(4) 提...

2· 102·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, included scripts, and runtime instructions consistently implement a Textin document-parsing client that uploads files/URLs to https://api.textin.com/ai/service/v1/pdf_to_markdown. Requested inputs (x-ti-app-id and x-ti-secret-code) are appropriate and expected.
Instruction Scope
SKILL.md and the scripts restrict actions to configuring credentials and sending files/URLs to the Textin API for parsing. Note: using the skill will upload document contents (or URLs) to a third-party service — this is expected behavior but important for privacy/compliance.
Install Mechanism
No install spec; the skill is instruction-plus-scripts only. Provided shell and Python scripts run locally and require standard tools (bash, python3, curl/requests). No downloads from untrusted URLs or package installs are present.
Credentials
The skill requests only the Textin App ID and Secret, which is proportional to its function. Implementation stores credentials unencrypted in ~/.openclaw/textin-config.json — functional but a plaintext storage/privacy risk the user should be aware of.
Persistence & Privilege
always=false and the skill does not request elevated/system-wide permissions. It does persist credentials to a file in the user's home directory, which is normal for a client but creates a persistent secret on disk that the user may want to manage or encrypt.
Assessment
This skill appears to do what it says: it sends files or file-URLs to Textin's API and returns parsed markdown/structured data. Before installing: (1) verify you trust the Textin service and the API domain (api.textin.com) because document contents will be uploaded to that third party; (2) be aware credentials are stored in plaintext at ~/.openclaw/textin-config.json — consider storing them in a secure credential manager or removing the file when not needed; (3) avoid providing high-privilege or unrelated secrets to the skill; (4) if handling sensitive documents, check Textin's data retention/privacy policy and consider redaction or local alternatives; and (5) revoke the API keys if you suspect they were exposed.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bshsbq012ssbr6n3jhsc8cx83fp3h

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments