Ticket Signal Watch

v0.1.0

Monitor ticket pages or backend ticket data for sale, restock, presale, or status-change signals; emit structured alerts that can be pushed to OpenClaw chann...

0· 88·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included files: the script fetches pages, looks for ticket-related keywords, tracks state, and emits structured results. Requiring python3 and providing example configs is proportionate.
Instruction Scope
SKILL.md and the script stay within the stated purpose. The script fetches arbitrary URLs listed in the targets config and writes a state JSON. That behavior is expected, but be aware it will make outbound requests to any URL you place in targets (including internal endpoints if run in a networked/cloud environment). The script does not read other system files or environment variables.
Install Mechanism
This is an instruction-only skill with no install steps; no external packages or downloads are performed. Lowest-risk install footprint.
Credentials
The skill declares no required credentials or env vars. Example notifier config shows webhook URLs and Authorization headers — those are user-provided values you may store in config files. Storing secrets in plain JSON files has usual operational risks; the skill itself does not require or exfiltrate credentials.
Persistence & Privilege
always is false and the script only writes its own state JSON (and would write to any file path you configure). It does not modify other skills or system settings.
Assessment
This skill appears coherent for monitoring ticket pages. Before running: inspect and control the targets.json you feed it (don't include internal-only URLs if running in a shared/cloud agent), ensure the state and notifier paths are writable and stored where you want data retained, and avoid placing secret tokens in plain text files unless you accept that risk. Note the example notifier shows webhook headers but the script does not automatically POST alerts — you'll need to wire notifications yourself (or extend the script). Also respect terms of service and anti-bot protections of target sites; the script will flag anti-bot pages but does not bypass them.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ew7bv77e2gkkbb5kwcjqn3d83bjdm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🎫 Clawdis
Binspython3

Comments