Weibo Trending Topics
v1.0.0Track Weibo hot search trends (微博热搜) in real-time. Fetches live trending topics, categories (娱乐/社会/科技/体育), and historical trend data. Zero config required. T...
⭐ 0· 164·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the instructions: SKILL.md shows direct requests to Weibo public endpoints and optional local-file comparison for history. There are no unrelated environment variables, binaries, or installs requested.
Instruction Scope
Instructions are narrowly focused: perform HTTP GET to https://weibo.com/ajax/side/hotSearch and parse JSON; optional functions read local JSON files for historical comparison. The instructions do not request unrelated system files, secrets, or external endpoints.
Install Mechanism
No install spec and no code files—this is instruction-only. That minimizes disk/write risk; runtime network calls are the only external action and are appropriate for the stated purpose.
Credentials
The skill requires no environment variables, credentials, or config paths. The lack of secrets is proportional to a public-data scraping task.
Persistence & Privilege
Skill is not always-on, does not request elevated privileges, and does not modify other skills or system-wide settings. It relies on network access at runtime, which is normal for this function.
Assessment
This skill appears coherent and low-risk: it simply fetches Weibo's public hot-search JSON and optionally compares saved JSON files. Before installing, consider: (1) the agent will perform network requests to weibo.com (your IP and environment metadata will be visible to that site); (2) respect Weibo's terms of service and rate limits—continuous polling may get blocked; (3) if you plan to store scraped results, treat them like any collected data (protect sensitive content, be mindful of PII); and (4) review any code you run locally (the example is straightforward Python using requests). No credentials or installs are required, so there are no obvious secret-exfiltration risks in the provided instructions.Like a lobster shell, security has layers — review code before you run it.
aivk971dqab10s9q20bm31qq1q0bn84hhyzautomationvk971dqab10s9q20bm31qq1q0bn84hhyzlatestvk971dqab10s9q20bm31qq1q0bn84hhyz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
