content-extraction

v1.1.0

OpenClaw-native executable content extraction skill for URLs, Feishu, YouTube, and web pages.

0· 88·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (content extraction for URLs, Feishu, YouTube, web pages) matches the provided assets: router and executor scripts, mapping notes, and docs. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md instructs the agent to use OpenClaw tools (browser, feishu, web_fetch, transcript chains) and to save long content locally. The included Python scripts only classify URLs and emit extraction specs / save-path suggestions — they do not themselves call network endpoints or read secrets. Be aware the runtime will rely on platform tools (browser/feishu/etc.) to perform actual fetches, which is expected for this skill.
Install Mechanism
No install spec or remote downloads. This is instruction- and script-only; nothing will be written to disk by an installer. The risk surface is limited to the scripts included in the skill bundle.
Credentials
The skill declares no required env vars or credentials. However, its runtime behavior (per SKILL.md) expects platform-provided tools that may themselves need credentials (e.g., Feishu API tokens or browser tooling with access). The absence of required env vars in the skill is reasonable but means it relies on the agent/platform to provide any needed credentials.
Persistence & Privilege
always is false and the skill does not request persistent/privileged presence. The scripts suggest saving to extracted/ by default (they only generate a save path), which is a modest local-write behavior and proportionate to the stated purpose.
Assessment
This skill appears internally consistent and focused on building extraction plans; the included scripts only classify URLs and emit specs (they do not perform network calls or exfiltrate data). Before installing, consider: 1) The actual extraction depends on OpenClaw tools (browser, feishu, web_fetch, transcript chains). Those tools may require credentials (e.g., Feishu tokens) and will perform network access — ensure you trust the platform and how those tool credentials are managed. 2) The skill suggests saving long outputs under extracted/ — check filesystem permissions and where files will be stored. 3) If you plan to extract private documents (Feishu/wiki) confirm the platform has appropriate access controls and audit logs. If any of those runtime tools are unfamiliar or untrusted in your environment, review their configurations before enabling the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk97481gkzrprhf817jhagj66zs83xnm1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments