买手妈妈返利助手

v0.1.0

买手妈妈母婴社交电商返利工具,专注母婴消费群体,提供母婴商品优惠券查找和返利服务,覆盖淘宝京东拼多多等平台。

0· 45·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description claim a cashback/coupon assistant for mother-and-baby e-commerce across Taobao/JD/PDD. The skill declares no binaries, no env vars, and no install — which is proportionate for a lightweight instruction-only helper. Nothing requested is unrelated to the stated purpose.
Instruction Scope
SKILL.md contains only a high-level description, trigger phrases, planned capabilities, and an output format. It does not instruct the agent to read system files, access environment variables, or exfiltrate data. There are no vague 'gather whatever context you need' directives.
Install Mechanism
No install specification or code files are present. Being instruction-only, it does not write files or download external code — lowest-risk install posture.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate request for secrets or unrelated service tokens.
Persistence & Privilege
Flags show always:false and normal user-invocable/autonomous settings. The skill does not request persistent/system-wide privileges or to modify other skills' configs.
Assessment
This skill is internally consistent and low-risk as presented, but it is only an instruction template — it does not include code or specify how to fetch coupons. Before using, consider: (1) the agent will need web/API access to find coupons — verify any external links or scraped results before clicking; (2) do not provide platform credentials unless a trustworthy implementation is provided; (3) confirm that any coupon-scraping or automation complies with the merchants' terms of service. If you want stronger guarantees, ask the publisher for an implementation detail (how it fetches coupons, sources, and privacy practices) before installing or granting credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk979hj98kkvcxb5s4qtgn7ch8s83tprv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments