Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (cross-border shopping, price/tax/shipping estimation, authenticity checks, tracking) match the SKILL.md content. All declared capabilities are descriptive guidance rather than automated integrations, so requested capabilities are proportionate to the stated purpose.
Instruction Scope
SKILL.md contains only explanatory guidance, pricing tables, risk warnings, and suggestions; it does not instruct the agent to read local files, access credentials, run commands, or transmit data to external endpoints. It lists related skills but gives no steps that expand scope beyond a shopping advisor.
Install Mechanism
No install specification and no code files are present. Being instruction-only, it does not install binaries or download archives, which minimizes installation risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. There are no names like SECRET/TOKEN/KEY and no justification needed for secrets.
Persistence & Privilege
always is false (default), user-invocable is true, and model invocation is allowed (normal). The skill does not request system-wide persistence or modify other skills' settings.
Assessment
This skill is documentation-only and appears coherent with its stated purpose. Before installing or using: (1) note the source/homepage is unknown—if you plan to act on recommendations (place orders, pay deposits), verify the operator and payment channels externally; (2) the skill does not implement payment, order placement, or shipment APIs—those actions would require other integrations you should review for credentials and network behavior; (3) avoid submitting sensitive personal data or payment details through an unverified skill; and (4) if the agent uses related skills (customs, shipping, luxury-goods), review those skills separately because they may request credentials or perform network calls.Like a lobster shell, security has layers — review code before you run it.
latestvk97dq6svat107xy9pya0jgpjsh849z13
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛍️ Clawdis
