Scholar
v1.0.0Search academic literature with Google Scholar using effective queries, citations, and filters.
⭐ 3· 2.5k·18 current·18 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md content: the file contains guidance for constructing Google Scholar queries, filters, and citation-finding strategies. The skill declares no binaries, env vars, or installs — which is appropriate for a purely instructional helper.
Instruction Scope
The instructions are limited to search operators, filters, how to locate full text, and how to interpret citations. They do not direct the agent to read local files, access unrelated system resources, or transmit data to unexpected endpoints. The doc does mention using a Google account, VPN/institutional access, and browser extensions (Unpaywall) — these are user actions outside the skill and are reasonable contextual suggestions, not hidden requests for credentials.
Install Mechanism
No install spec and no code files are present; the skill is instruction-only, so nothing is downloaded or written to disk. This is the lowest-risk install profile.
Credentials
The skill requires no environment variables, keys, or config paths. While it references actions that may use a Google account or institutional VPN in practice, the SKILL.md does not request those secrets or attempt to access them.
Persistence & Privilege
Defaults are used: always:false and autonomous invocation allowed (platform default). The skill does not request persistent presence, nor does it modify other skills or system configuration.
Assessment
This skill is a safe, read-only set of tips for using Google Scholar. Because it is instruction-only and requests no credentials or installs, the immediate risk is low. Before enabling any agent to act on these instructions, consider: (1) whether the agent has web-browsing or connector permissions—if so it could perform searches or open links (which is expected behavior for this skill); (2) avoid providing account credentials or VPN access unless you trust the agent and need it for institutional full-text access; and (3) automated scraping of Google Scholar may violate Google's terms of service—use the guidance interactively rather than enabling bulk automated queries. If the publisher later adds code or an install step, re-evaluate for downloads, network endpoints, or secret requests.Like a lobster shell, security has layers — review code before you run it.
latestvk974wtxc5xr9h6gm5hrf13enhx80w3fj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎓 Clawdis
OSLinux · macOS · Windows
