Hunyuan

v0.1.0

整理腾讯混元大模型公开产品页及文档信息,包括模型能力、定价、文档目录及示例链接的摘要和汇总。

0· 187·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description state public-page summarization; SKILL.md only asks to visit public product/doc pages and extract model/pricing/docs data. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Instructions are limited to visiting public pages, waiting for dynamic content, extracting listed fields, and respecting rate limits; they explicitly forbid account operations, API calls or sensitive-data collection. No guidance to read local files or access unrelated environment variables.
Install Mechanism
No install spec and no code files (instruction-only). This minimizes on-disk execution risk; however, runtime may require the agent to use existing web-fetch or browser automation capabilities already present in the environment.
Credentials
No required environment variables, credentials, or config paths are declared or referenced. The data to be accessed is public and the requested scope is proportionate.
Persistence & Privilege
always is false, the skill is user-invocable, and it does not request persistent or elevated privileges or attempt to modify other skills or system configuration.
Assessment
This skill appears coherent and limited to scraping public Tencent Hunyuan pages and summarizing them; it asks for no secrets. Before installing, verify you are comfortable allowing the agent network access to those public pages (and that your environment enforces rate limits and respects robots.txt if desired). If your environment lacks a headless browser or JS-capable fetcher, the agent may have trouble with dynamically loaded content—ask the developer how dynamic pages will be handled. If you require strict auditing, request a confirmation that the agent will not log or transmit scraped data to external endpoints beyond the summary output.

Like a lobster shell, security has layers — review code before you run it.

latestvk9741vcmksk83m82wbthtnwm1s832vr1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments