Ecommerce
v1.0.0Build and operate online stores with payment security, inventory management, marketplace integration, and conversion optimization.
⭐ 8· 3.5k·32 current·32 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description (building and operating stores) match the contents: architecture guidance, operations, platform comparisons, growth tactics and code examples. Nothing in the package requires unrelated privileges or credentials.
Instruction Scope
All runtime instructions are documentation and code snippets (best practices for webhooks, inventory updates, CRO, operations). The SKILL.md explicitly states it will not connect to live store APIs or store credentials. No instructions ask the agent to read system files, environment variables, or transmit data to unexpected endpoints.
Install Mechanism
No install spec and no code files to execute — this is instruction-only, the lowest-risk model for install behavior.
Credentials
The skill declares no required environment variables, no primary credential, and no config path access. Example code references (e.g., webhookSecret, db) are illustrative only and not requested by the skill itself.
Persistence & Privilege
The skill is not marked 'always' and does not request persistent system or other-skills modifications. Autonomous agent invocation is allowed (platform default) but is not combined with any broad privileges or credentials.
Assessment
This skill is a library of ecommerce best practices and code examples only — it won't install or run code or ask for your keys. Still be cautious when copying sample code into production: replace placeholder secrets (e.g., webhookSecret), validate any database/transaction logic in your environment, and never paste real credentials into an agent chat. If you later add connectors that let the agent act on your live store, re-evaluate access controls and credentials carefully.Like a lobster shell, security has layers — review code before you run it.
latestvk9727e9krs3zg6taxrgwthfsd181aj6m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛒 Clawdis
OSLinux · macOS · Windows
