Catalog SKU Matcher India
v1.0.0Match and normalize product listings across Indian ecommerce catalogs with variant-aware rules, confidence scoring, false-match prevention, and review queues...
⭐ 0· 88·0 current·0 all-time
byASP@anugotta
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, and provided files (matching rules, scoring, examples, setup, validation) all align: the skill is focused on catalog SKU matching and normalization and does not request unrelated capabilities or resources.
Instruction Scope
SKILL.md and the supplemental docs contain only matching strategies, rulebooks, scoring, setup and validation checklists. There are no instructions to read system files, access environment variables, call external endpoints, or transmit data outside the matching workflow.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is downloaded or executed on install and nothing is written to disk by the skill itself.
Credentials
No required environment variables, credentials, or config paths are declared. The requested resources are minimal and proportional to an instruction-only matching guide.
Persistence & Privilege
Flags show always:false and default agent invocation behavior. The skill does not request persistent presence or modification of other skills or system-wide settings.
Assessment
This skill is a set of guidelines and rule files (no code or installs), so the immediate risk is low. Before using in production: (1) implement the rules in your own audited code rather than blindly executing external code, (2) build and run labeled validation sets as the setup and validation checklists recommend, (3) keep conservative auto-match thresholds and human review for ambiguous cases, (4) ensure any real data you feed into an implementation complies with privacy and marketplace TOS, and (5) if you add connectors that fetch catalogs, review those connectors for credential use and external endpoints (those are the places that can introduce risk).Like a lobster shell, security has layers — review code before you run it.
latestvk97dcrvnc3kp5y51cczt5x410183650g
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧩 Clawdis
