kuaishou-login
v1.0.0自动化执行快手创作者平台二维码登录,截图扫码,监听登录状态并返回成功或超时结果。
⭐ 0· 51·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (kuaishou QR login) align with the runtime instructions: opening the creator site, locating the login/QR, taking screenshots, and monitoring page state. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md stays narrowly focused on browser automation steps (browser.open, find/click, screenshot, wait_for) and returning login success/timeout. It does not instruct reading system files, environment variables, or sending data to external endpoints beyond returning screenshots/results to the user. It does instruct keeping the page open and monitoring login state (expected for this task).
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk or downloaded. This is lowest-risk for install mechanism.
Credentials
No environment variables, credentials, or config paths are requested. The required access (a browser automation capability) is proportional to the task.
Persistence & Privilege
always is false and the skill does not request persistent presence or elevated privileges. It only expects to be invoked when needed and to run browser interactions for the duration of the login attempt.
Assessment
This skill is coherent with its purpose. Before installing, confirm the agent runtime provides a trusted browser-automation environment (the skill expects browser.open, screenshot, etc.). Be aware screenshots will include on-screen user information (QR, avatar, username) and will be returned to whoever invoked the skill — avoid using it with accounts you consider highly sensitive unless you trust how screenshots/results are stored and transmitted. If you see any future changes that add reading cookies, exporting tokens, posting screenshots to external URLs, or additional environment variables, treat those as suspicious and revisit this evaluation.Like a lobster shell, security has layers — review code before you run it.
latestvk97fjybt3fvvxj9f9k4sbpthk584s9wj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
