Fanqie Novel

v0.1.0

Provides summaries and trend data of popular novels and short drama IPs from Fanqie Novel public pages without downloads or bulk scraping.

0· 707·4 current·5 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md: the skill is explicitly about extracting summary and trend data from public Fanqie Novel pages. The registry shows no required binaries, env vars, or config paths, which is proportionate for a read-only public-page summarizer.
Instruction Scope
The SKILL.md limits activity to visiting public pages, extracting fields, and rate-limiting (no downloads or bulk scraping). It also notes pages are dynamically rendered and will need waiting/parsing — this implies use of a headless browser or similar rendering capability, which is not declared but is a reasonable runtime detail. The instructions do not request access to unrelated files, credentials, or external endpoints beyond the site.
Install Mechanism
No install spec and no code files (instruction-only). This is low-risk: nothing is downloaded or written to disk as part of an installer in the skill bundle.
Credentials
The skill declares no required environment variables, credentials, or config paths. That is appropriate for the stated purpose of reading publicly accessible pages.
Persistence & Privilege
always is false and autonomous invocation is allowed (platform default). The skill does not request elevated persistence or to modify other skills or system-wide configuration.
Assessment
This skill is internally consistent and low-privilege, but before installing consider: (1) the skill author/source is unknown—confirm you trust the owner or registry entry; (2) the skill will need network access and likely a headless-browser-capable runtime to handle dynamic pages—ensure your platform enforces rate limits and usage policy to avoid accidental heavy scraping; (3) verify the target site's terms of service allow automated access for the intended use; (4) if you want stronger safeguards, restrict autonomous use (use user-invocable only) or monitor request logs and set rate limits so the agent cannot perform repeated/large-scale collection.

Like a lobster shell, security has layers — review code before you run it.

latestvk9791ddnwcjfe3nna098wr1jqs832s25

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments