ENI收割者v14

v1.0.1

Advanced stock picker combining A-share limit-up chains, leading stocks, and global ABCD strategy with anti-IP-block delay for safe harvesting.

0· 134·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe an AkShare-based A-share picker and the skill only references akshare and pandas (also listed in requirements.txt). No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md contains a short Python snippet that sleeps for a randomized interval, calls ak.stock_zt_pool_em(date=...), filters and formats results. It does not read local files, environment secrets, or send data to third‑party endpoints beyond what akshare itself does.
Install Mechanism
No install spec is provided (instruction-only). A requirements.txt lists common PyPI packages (akshare, pandas). There are no downloads from unknown URLs or archive extraction steps.
Credentials
The skill requests no environment variables or credentials; the behavior (network calls via akshare) is proportional to the stated purpose of fetching market data.
Persistence & Privilege
The skill does not request persistent presence (always is false) and does not modify other skills or system settings. Model invocation is allowed (platform default) which is expected for an agent skill.
Assessment
This skill is internally consistent with its description, but note: it contains executable Python in SKILL.md that will call akshare (which makes network requests to data sources). Before installing or running: (1) verify you trust akshare and the environment will install/execute packages from requirements.txt; (2) be aware the code intentionally uses randomized delays to avoid IP blocking — that may violate data provider terms of service; (3) run in an isolated environment if you want to limit blast radius; and (4) if you need higher assurance, review the exact akshare functions and network behavior on your network (or pin package versions).

Like a lobster shell, security has layers — review code before you run it.

financevk97dsya9sx2e3twqng62vbbn5d832bvvlatestvk97ef07etj8tkdnj2efcrq8qas832yysquantvk97dsya9sx2e3twqng62vbbn5d832bvv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments