Assortment Scout

v1.0.0

Audit an ecommerce catalog, spot SKU sprawl, price and attribute coverage gaps, hero dependence, long-tail bloat, and duplicate-risk clusters, then turn roug...

0· 45·0 current·0 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description, SKILL.md, and handler.py all implement a heuristic assortment-audit assistant. Required capabilities (none) match the stated scope; there are no unrelated dependency or credential requests.
Instruction Scope
SKILL.md explicitly states it does not access live ERP/PIM/marketplace data and warns against automated changes. The included handler.py only parses input and renders a markdown brief; it does not read external system files, call network endpoints, or access environment variables.
Install Mechanism
There is no install spec (instruction-only). Code files are included but there is no download/install mechanism or execution of external installers. This is low-risk.
Credentials
The skill declares no required env vars, no primary credential, and no config paths. The runtime code does not attempt to read environment variables or secrets.
Persistence & Privilege
always is false and the skill does not request permanent presence or attempt to modify other skills or system settings. It does not persist credentials or enable itself automatically.
Assessment
This skill appears internally consistent and low-risk: it performs local, heuristic analysis of user-provided catalog data and returns a markdown brief. Before installing, you may (1) review handler.py in full to confirm no hidden network/file operations (the visible code is benign), (2) run the included tests in a safe environment to verify behavior, and (3) avoid pasting sensitive credentials or direct database exports into the skill input since the tool is meant to work from summaries/CSV excerpts and is not intended to perform live system changes.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bdxbzbdmtwvdd4get1p3b4d84s0ff

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments