llms-txt-sniffer
Locate and utilize AI-friendly documentation index files (llms.txt, llms-full.txt) or sitemap.xml. Use when encountering documentation URLs (containing /docs...
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 0 · 33 · 0 current installs · 0 all-time installs
by@jdchi
MIT-0
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, declared binaries (python3, curl), and included script align with the stated goal of locating llms.txt / sitemap.xml on documentation sites. No unrelated credentials, config paths, or binaries are requested.
Instruction Scope
SKILL.md restricts use to user-initiated document URLs and describes probing with curl -I then running sniffer.py. The script performs HTTP GETs (via urllib) and returns a content preview (up to 2000 chars). It does not read local files or environment variables. Note: the skill performs network requests and DNS resolution; this is expected but the agent should follow the 'user-initiated only' guideline when invoking it.
Install Mechanism
Instruction-only with a bundled small Python script. No install spec or external downloads; nothing is written to disk beyond the existing code file. Low install risk.
Credentials
No environment variables, credentials, or config paths are requested. The required tools (python3, curl) are appropriate for the task.
Persistence & Privilege
always is false and the skill does not request elevated or persistent platform privileges. It does not modify other skills or system-wide settings.
Assessment
This skill appears coherent and limited: it runs HTTP probes and a small Python script to find llms.txt or sitemap.xml and returns a short preview. Before installing, consider: (1) only use it against public documentation URLs you control or are authorized to scan (the script does DNS lookups and fetches content and could reveal page text); (2) the script returns up to 2000 characters of file content — avoid running it on URLs that might expose secrets; (3) the SKILL.md asks for user-initiated use only, but the platform permits autonomous invocation by default — ensure you only enable autonomous runs if you trust it; (4) source/homepage is unknown — if you need stronger assurances, review or run the sniffer.py code in a sandboxed environment yourself before use.Like a lobster shell, security has layers — review code before you run it.
Current versionv1.3.1
Download ziplatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspython3, curl
SKILL.md
llms-txt-sniffer: The Smart Document Radar
This skill streamlines documentation ingestion by locating the most AI-optimized version of a site's content.
🧠 Why llms.txt?
It provides a high-density, Markdown-based index designed for LLMs to map entire sites instantly and save tokens.
🚀 Discovery Strategy (Two-Stage)
Stage 1: Quick Jump Probes (Instructional)
- URL + /llms.txt: Probe
{input_url}/llms.txtusingcurl -I. - Domain Root: Probe
https://{domain}/llms.txtusingcurl -I.
Stage 2: Advanced Sniffing (Tool-based)
If Stage 1 fails, run the companion sniffer script located in this skill's directory:
python3 sniffer.py $ARGUMENTS
📜 Behavioral Rules
- User-Initiated Only: Only invoke this skill when the user explicitly provides a documentation URL. Do not autonomously scan domains.
- Switch to High-Speed Mode: Once an index is found, prioritize its links over manual scraping.
- Index Summary: Always present a brief structure overview.
- Fallback: Use
sitemap.xmlparser results ifllms.txtis missing.
Files
3 totalSelect a file
Select a file to preview.
Comments
Loading comments…
