UC Browser

v0.1.0

整理UC浏览器官方网站公开的下载入口、功能说明、平台支持、权限及帮助信息。

0· 119·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and SKILL.md all state the same purpose (collect and summarize public UC Browser pages). The skill requests no credentials, binaries, or installs — consistent with a read-only public-web aggregation task.
Instruction Scope
SKILL.md limits activity to public webpages (homepage, downloads, help, privacy, changelogs) and explicitly disallows device control, private data access, or installing packages. It does not instruct the agent to read unrelated files, config paths, or environment variables.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is written to disk or downloaded as part of installation — lowest-risk install profile.
Credentials
No environment variables, credentials, or config paths are requested. The data the skill needs (public web pages) does not require secrets or elevated access.
Persistence & Privilege
always is false and there is no indication the skill requests persistent or elevated privileges. Autonomous invocation is allowed by default but not combined with other concerning factors.
Assessment
This skill appears coherent and low-risk: it only describes collecting public UC Browser documentation. Before installing, be aware that the agent will need network access to fetch webpages — ensure you trust requests to the declared domains (e.g., ucweb.com) and avoid automatic downloading or execution of installers the skill might list. If you plan to use the skill in an environment with strict network or data policies, restrict outbound network access to known official domains and do not allow the agent to run or install downloaded binaries. If you need higher assurance, ask the maintainer for explicit fetch/HTTP client behavior (which domains are contacted and whether downloads are merely listed vs automatically saved).

Like a lobster shell, security has layers — review code before you run it.

latestvk97dj3f1zeq2mmtbe7a9nt5sm583dhte

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments