Qianwen

v0.1.0

Summarizes and organizes public information on Alibaba's Qianwen model, including features, pricing, and documentation from official product pages.

0· 150·0 current·0 all-time
byClawKK@codekungfu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (summarize public Alibaba Qianwen pages) matches the SKILL.md: only public product/docs pages are referenced and no unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md confines actions to visiting and extracting public pages, respecting rate limits and avoiding account/API operations. It does note that pages are dynamically loaded and need waiting; this implies the agent must have web-browsing/rendering capability (headless browser or page renderer), which is not declared but is a reasonable operational requirement rather than a security red flag.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk or fetched at install time.
Credentials
No environment variables, credentials, or config paths are requested. The declared scope (public pages only) justifies the lack of secrets.
Persistence & Privilege
always is false (no forced persistent presence) and the skill does not request special privileges or modifications to other skills or system settings.
Assessment
This skill appears coherent and limited to scraping and summarizing public Qianwen documentation. Before installing, confirm your agent's browsing/scraping capability (some agents need a headless browser to handle dynamic pages). Be aware of site crawling rules and rate limits; if you are concerned about network activity, restrict autonomous invocation or monitor outbound requests. Because the skill is instruction-only, its behavior depends on the agent's web access — ensure that the agent will not be given credentials that could expose private content.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c0cfrf7kh6qr4rs4vhwtgx18346rx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments