根据你的要求总结资讯摘要
v1.0.1Researches news and factual information on the web, then produces a cited, deduplicated summary tailored to constraints (topic, time range, region, sources,...
⭐ 1· 227·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the instructions: the SKILL.md describes web search, source triage, deduplication, and cited summaries — all directly relevant to a news-research summary skill. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Instructions consistently stay within the researcher/summarizer role (search, verify, cite, dedupe). One operational note: the skill assumes the agent has web-search/browsing capability to fetch links; if the runtime doesn’t provide browsing, the model may hallucinate sources. This is a correctness/operational risk rather than a security incoherence.
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest-risk install profile. Nothing is written to disk or fetched at install time.
Credentials
No environment variables, credentials, or config paths are required. The absence of secrets aligns with the skill's stated purpose.
Persistence & Privilege
always is false; skill is user-invocable and can be invoked autonomously by the agent per platform defaults. It does not request persistent or cross-skill privileges or modify system/other-skill configs.
Assessment
This skill appears internally consistent and low-risk: it asks for no credentials or installs and only contains instructions for web research and citation. Before enabling it, confirm that your agent runtime actually provides a reliable web-search/browsing tool (otherwise the model may invent sources). Also: always spot-check the cited links and dates in outputs — the skill emphasizes not inventing sources, but verification depends on the agent's access to the web. If you have domain restrictions (e.g., internal-only sources or disallowed websites), configure or restrict browsing accordingly.Like a lobster shell, security has layers — review code before you run it.
latestvk975jn6bpa36t4nr5fzpd4zccs82sg07
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
