Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description and SKILL.md both describe querying logistics/index data from the specified jingwe.jdl.com pages. The skill asks for no unrelated binaries, credentials, or config paths, which is proportionate to a public-data query task.
Instruction Scope
Instructions direct the agent to read data from two specific URLs and filter by user inputs; they do not request other system files or credentials. However, the pages are single-page-app routes (hash fragments) that likely require JavaScript for rendering; the SKILL.md does not specify how to fetch or render those pages (headless browser vs simple HTTP GET), nor does it mention respecting robots.txt, rate limiting, or site terms—this is a functional ambiguity rather than a security mismatch.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing will be downloaded or written to disk during install—this is the lowest install risk.
Credentials
The skill requests no environment variables, credentials, or config paths. That is appropriate for a public web-data query and raises no unexplained access to secrets.
Persistence & Privilege
always is false and the skill is user-invocable. The skill does not request permanent presence or privileged modifications to other skills or system settings.
Assessment
This skill appears coherent: it scrapes public pages for logistics-index data and asks for no secrets. Before installing: (1) confirm you are comfortable with the agent making HTTP requests to jingwe.jdl.com; (2) verify that scraping those pages is allowed by the site's terms of service and that the data is public; (3) expect potential implementation issues because the target pages appear to be a JavaScript-rendered SPA—the agent may need a headless-browser capability to extract the data accurately; (4) test outputs for correctness (dates, timezones, T-1 logic) and be cautious about rate limits or blocking by the site. If you need the skill to access private/internal data or to run complex rendering, request an implementation that documents how pages are fetched and how credentials (if any) would be used.Like a lobster shell, security has layers — review code before you run it.
latestvk97c9aht901p0e3wez7qvhn6jx83gf9y
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
