Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
VeriGlow Agent Map
v0.2.0Look up VeriGlow Agent Map for any website URL to discover its data functions, internal APIs, browser automation recipes, and agent reliability reports. Use...
⭐ 1· 292·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md: the skill tells the agent how to look up Agent Maps on veri-glow.com and only declares curl as a required binary, which is proportionate to fetching those pages.
Instruction Scope
SKILL.md instructs the agent to fetch pages from https://veri-glow.com/{target}, provides curl examples and browser-automation JS snippets to run in a page context. This stays within the stated purpose, but it explicitly suggests using proxies to bypass geo-blocking and includes runnable JS/Playwright-style recipes — functionality that can be used for heavy scraping or to circumvent access restrictions, so exercise operational and legal caution.
Install Mechanism
No install spec or code files; instruction-only skills are low-risk because nothing is downloaded or written to disk by the skill itself.
Credentials
The skill declares no environment variables, no credentials, and no config paths. It does not request unrelated secrets or system access.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request elevated persistence or modify other skills or system settings.
Assessment
This skill merely fetches documentation pages from veri-glow.com and provides curl examples and JS automation recipes. Before installing, verify you trust veri-glow.com (the source is listed as unknown in the registry metadata). Be aware the instructions encourage using proxies to bypass geo-blocking and include automation snippets that could be used for large-scale scraping — confirm you have the right to access and scrape the target sites, respect rate limits and terms of service, and avoid using untrusted proxies that could expose your traffic or credentials. If you plan to allow autonomous calls, know the agent may make outbound requests to veri-glow.com and to the target sites; limit network access or review logs if you need tighter control.Like a lobster shell, security has layers — review code before you run it.
latestvk97f5z4j59mkaxdd2qh8y115bs82bn4n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🗺️ Clawdis
Binscurl
