Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description claim public-page scraping and summarization; the SKILL.md only discusses visiting public pages, extracting visible fields, and summarizing metrics. No unexpected credentials, binaries, or installs are requested.
Instruction Scope
The instructions describe visiting topic/board/share pages, waiting for dynamic rendering, extracting titles/metrics, and applying frequency controls. They explicitly state no login/anti-fraud bypass. This is within scope, but the guidance is high-level and leaves implementation choices (headless browser, scraping cadence) to the agent — which can affect compliance and operational risk.
Install Mechanism
No install spec and no code files (instruction-only). That minimizes on-disk code risk; runtime behavior depends on the agent's browsing/scraping tooling, which is external to the skill.
Credentials
No environment variables, credentials, or config paths are requested. The lack of secrets is proportionate to an intended read-only analysis of public pages.
Persistence & Privilege
always is false and the skill does not request system-wide persistence or modification of other skills. Autonomous invocation is allowed (platform default) but not combined with other elevated privileges.
Assessment
This skill appears coherent but you should still: (1) verify that scraping public WeChat Channels complies with legal and platform Terms of Service in your jurisdiction; (2) ensure the agent uses approved tooling (e.g., a controlled headless browser) and enforce strict rate limits to avoid IP blocks or anti-bot escalation; (3) do not provide any WeChat account credentials — the skill explicitly says it doesn't need them; (4) monitor and log agent scraping activity and limit the volume of data collected to avoid privacy issues; and (5) test on a small dataset first and confirm that the agent's concrete scraping implementation does not attempt to bypass human verification or otherwise exceed the documented scope.Like a lobster shell, security has layers — review code before you run it.
latestvk972772r1yj18vgzfwhsmmvywh83fjvv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
