Juejin
v0.1.0检索与摘要掘金公开技术文章和话题,提取标题、互动数据及技术要点,支持趋势统计,遵守采集限制。
⭐ 0· 196·0 current·0 all-time
byClawKK@codekungfu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description describe retrieving and summarizing public Juejin content. The skill requests no credentials, binaries, or installs — which is proportional and expected for a read-only, public-web scraping/summary helper.
Instruction Scope
SKILL.md instructs the agent to search public site pages, open article pages, and extract title/tags/metrics/technical points. It explicitly disclaims bulk scraping and API reverse-engineering and recommends human-in-the-loop for dynamic rendering/CAPTCHA. The instructions are narrowly scoped to public content, but they are somewhat high-level (no concrete fetch/throttling limits), which could lead to differing agent implementations; recommend explicit rate limits and respect for robots.txt/site TOS.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest-risk install model (nothing written to disk).
Credentials
The skill declares no environment variables, credentials, or config paths. That is proportional for a read-only public-data summarizer.
Persistence & Privilege
always is false and autonomous invocation is allowed by default. There is no request for permanent system-wide presence or modification of other skills/config — appropriate for this skill.
Assessment
This skill appears coherent and low-risk, but before installing consider: (1) confirm the agent will respect rate limits and robots.txt and avoid automated bulk scraping or evading CAPTCHA; (2) do not provide any credentials — none are needed; (3) if you need large-scale or frequent data, prefer official APIs or explicit permission from juejin.cn to avoid ToS/legal issues; (4) ask the skill author to add explicit throttling guidance and clarify how dynamic pages are fetched to avoid accidental aggressive crawling.Like a lobster shell, security has layers — review code before you run it.
latestvk9748s88rzmctcxcp69nzs9061830k4h
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
