Font Interceptor

v1.0.0

Extract fonts (TTF/OTF) from any website using MSCHF Font Interceptor. Use when user drops a URL and wants to identify/extract/download fonts from that websi...

0· 444·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for honeybee1130/font-interceptor.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Font Interceptor" (honeybee1130/font-interceptor) from ClawHub.
Skill page: https://clawhub.ai/honeybee1130/font-interceptor
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install font-interceptor

ClawHub CLI

Package manager switcher

npx clawhub@latest install font-interceptor
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (extract fonts from websites) align with the SKILL.md: it directs the agent to use the MSCHF Font Interceptor to input a URL and report found fonts and download links. Using a web tool for this task is coherent.
!
Instruction Scope
SKILL.md instructs the agent to use a browser tool with profile:"openclaw", take snapshots, locate input fields, and submit the target URL to a third-party site. Taking snapshots and using a named profile may capture or reuse cookies, stored credentials, open tabs, or other sensitive data. The skill does not declare or justify use of that profile or describe how snapshots are stored/handled, which is scope creep beyond simple URL submission.
Install Mechanism
Instruction-only skill with no install steps or external downloads; nothing is written to disk by the skill itself. This is low install risk.
!
Credentials
The skill requests no environment variables or credentials, which is appropriate, but it references a specific browser profile (openclaw) that may grant access to stored cookies/credentials or local browser state. It also sends the target URL (and possibly resulting page content) to a third-party service (fontinterceptor.mschfmag.com), which could leak information about the target site (including private or internal URLs). These privacy/credential-exposure risks are not acknowledged in the skill metadata or instructions.
Persistence & Privilege
The skill does not request always:true, does not modify other skills, and has no install-time persistence. Autonomous invocation is allowed (platform default) but not by itself a red flag here.
What to consider before installing
This skill will open a third-party website (fontinterceptor.mschfmag.com) and submit the URL you provide. Before installing or using it: (1) consider privacy — the target URL and any page contents may be transmitted to that external site (avoid submitting private/internal URLs or pages behind auth); (2) the instructions reference using a browser profile named "openclaw" and taking snapshots — confirm what that profile contains and whether snapshots or DOM data are stored or shared; (3) if you are worried about leaking cookies/credentials or other browsing data, run the workflow manually in an isolated/ephemeral browser profile or use the fallback manual instructions; (4) verify the third-party site's privacy policy and trustworthiness before sending data. If the publisher can clarify what the "openclaw" profile is and how snapshots are handled (ephemeral, local-only, not uploaded), that would reduce the risk and could raise confidence.

Like a lobster shell, security has layers — review code before you run it.

latestvk977c8n4b2pj6ghrvd53syqn1s81s46v
444downloads
0stars
1versions
Updated 2mo ago
v1.0.0
MIT-0

Font Interceptor

Extract fonts from any website using https://fontinterceptor.mschfmag.com/

Workflow

When user provides a URL to extract fonts from:

  1. Open browser to https://fontinterceptor.mschfmag.com/
  2. Enter the target URL in the search/input field
  3. Submit and wait for results
  4. Report found fonts (names + download links for TTF/OTF files)

Browser Automation

// Using browser tool with openclaw profile
// 1. Navigate to font interceptor
browser({ action: "open", targetUrl: "https://fontinterceptor.mschfmag.com/", profile: "openclaw" })

// 2. Take snapshot to find input field
browser({ action: "snapshot", profile: "openclaw" })

// 3. Type URL into input and submit
browser({ action: "act", request: { kind: "type", ref: "<input-ref>", text: "https://target-site.com", submit: true } })

// 4. Wait for results, take snapshot
browser({ action: "snapshot", profile: "openclaw" })

// 5. Report fonts found, including download links

Fallback (No Browser)

If browser unavailable, instruct user:

  1. Go to https://fontinterceptor.mschfmag.com/
  2. Paste URL: <target-url>
  3. Hit enter
  4. Download the fonts shown

Output Format

Report results as:

Fonts found on <url>:
- FontName.ttf [download link]
- FontName.otf [download link]

If no fonts found, report that the site may use system fonts or web-safe fonts only.

Comments

Loading comments...