LiteBrowse

v0.1.1

Extracts and summarizes the most relevant webpage passages for focused, low-token research without loading or summarizing the full page.

0· 77·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name, description, SKILL.md, and included script all describe the same functionality: extracting and ranking relevant text blocks from a page. The skill requests no credentials, no unusual binaries, and no config paths — everything is proportionate to a web-extraction helper.
Instruction Scope
Instructions are specific: run the bundled Python extractor with a URL or local HTML file and use only the returned blocks. This scope matches the stated purpose. One operational note: the script will perform network fetches for any HTTP(S) URL provided, and will read local files if given — so when executed in an environment where the agent has network access it can reach arbitrary hosts (including internal endpoints). That behavior is expected for a fetcher but carries the usual network/SSRF risk depending on your runtime environment.
Install Mechanism
No install spec — instruction-only with one included Python script. The script uses only Python standard libraries (urllib, html.parser, etc.), so there is no package download or extraction risk.
Credentials
The skill declares no environment variables, no credentials, and no config paths. The script does read either a network URL or a local file path provided at runtime, which is appropriate for its purpose.
Persistence & Privilege
always is false and the skill does not request persistent/system-level privileges or modify other skills. Autonomous invocation is allowed by default but is not combined with broad credentials or suspicious behavior here.
Assessment
This skill appears coherent: it includes a readable Python extractor that fetches a page (or reads a local HTML file), parses it, and returns high-relevance blocks. Before installing or enabling it, consider: (1) review the script (already included) and confirm you trust it; (2) if you run agents in environments with access to internal services, be aware the extractor will fetch arbitrary URLs you or the agent provide — this can be used to access internal endpoints if network access isn't restricted; (3) if you prefer tighter control, run the extractor in a network-restricted sandbox or feed it local HTML snapshots instead of live URLs. If those considerations are acceptable, the skill is consistent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk976e3x7b68vejz7vzfbgmeht583hj1esearchvk976e3x7b68vejz7vzfbgmeht583hj1etoken-efficientvk976e3x7b68vejz7vzfbgmeht583hj1ewebvk976e3x7b68vejz7vzfbgmeht583hj1e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments