china-southern

v0.1.0

Information assistant for 南航 China Southern. Search products, news, financials, and official resources for 南航 China Southern.

0· 34·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (China Southern info assistant) matches the SKILL.md: it instructs the agent to search for products, news, financials, and official resources. There are no unexpected binaries, env vars, or config paths declared.
Instruction Scope
Runtime instructions are limited: identify user query, use web search, prioritize the official site, present structured results with links. The instructions do not ask the agent to read local files, access unrelated environment variables, or exfiltrate data to external endpoints.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or fetched during install according to the provided metadata.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. That matches its described functionality of doing web searches and presenting results.
Persistence & Privilege
Flags show default behavior (not always: true) and allow user invocation/autonomy as normal. The skill does not request elevated or persistent system presence.
Assessment
This skill is internally consistent and low-risk from a permissions perspective: it only instructs the agent to perform web searches and link to official sources and requests no credentials or installs. However, the publisher/homepage are unknown — before installing, consider: 1) verifying the author (hanxueyuan) or source if you need stronger trust; 2) testing the skill in a non-sensitive environment to confirm behavior; 3) remembering the agent's web-search connector (if configured) may have its own permissions or network access—ensure that connector's scope is acceptable; and 4) always verify critical financial or legal information against primary sources rather than relying solely on the skill's summaries.

Like a lobster shell, security has layers — review code before you run it.

latestvk971cyx1djz69bn1zr3pcdq5g584540p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🏢 Clawdis

Comments