Supplier Sync Manager

v1.0.0

Build a supplier sync control brief for inventory, catalog, pricing, order-handoff, and onboarding workflows. Use when a team needs to spot mapping gaps, lat...

0· 50·0 current·0 all-time
byhaidong@harrylabsj
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the behavior: the skill turns a textual prompt into a structured control brief. It requires no cloud credentials, no unrelated binaries, and the code only performs local text analysis and rendering consistent with that purpose.
Instruction Scope
SKILL.md is narrowly scoped: it describes producing heuristic briefs and explicitly states it does not query live ERP/WMS/OMS/APIs. The handler code reads the SKILL.md file and the provided prompt and performs keyword-based inference; it does not access other files, environment variables, or network endpoints.
Install Mechanism
No install spec is provided (instruction-only). There are Python source and test files, but nothing installs external packages or downloads code from remote URLs.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. The code does not attempt to read environment secrets or other system credentials.
Persistence & Privilege
Flags show always:false and normal model invocation; the skill does not request permanent presence or modify other skills/config. It only reads its own SKILL.md at runtime.
Assessment
This skill appears internally consistent and low-risk: it processes the input prompt locally and produces a heuristic brief without contacting external systems or requiring credentials. Still: (1) treat the generated brief as advisory — review and approve any operational or SLA actions before applying them to production systems; (2) if you plan to run the included tests or execute the handler, do so in a controlled environment (the test modifies sys.path and imports the handler); and (3) if you need absolute assurance, inspect the remainder of handler.py (the file was partially shown) to confirm there are no hidden network calls or writes to unexpected locations.

Like a lobster shell, security has layers — review code before you run it.

latestvk972kh5qjcv3132f8n0pekjgg984t2qg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments