Design Platform Search

v1.0.1

Run public design search flows on Dribbble, Pinterest, and Behance without login, and extract normalized result fields such as title, search-page cover image...

0· 53·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and the SKILL.md all describe public, search-page-first scraping of three design platforms. The skill requires no credentials, binaries, or install steps — these are proportionate to a lightweight, instruction-only scraper.
Instruction Scope
Instructions stay on public pages and emphasize avoiding logins and not fabricating fields. They recommend browser automation, optional detail-page backfill for publish_time, and use of proxies/VPNs when needed. This is within scope, but the guidance to use proxies, VPNs, and automated browser traffic can increase operational risk (rate limiting, anti-bot measures, legal/ToS issues) and should be implemented with care.
Install Mechanism
No install spec and no code files — nothing is written to disk by the skill itself. That minimizes supply-chain risk; the runtime will rely on whatever browser automation stack the agent/environment already provides.
Credentials
The skill does not request environment variables, credentials, or config paths. It mentions optional proxies/VPNs but does not demand secret tokens or unrelated credentials, which is proportional to its purpose.
Persistence & Privilege
always is false, no modifications to other skills or agent config are requested, and autonomous invocation is the platform default. The skill does not request elevated persistence or cross-skill access.
Assessment
This skill appears coherent and limited to public, login-free scraping of design search pages. Before installing, ensure your environment can legally and technically perform automated scraping: confirm Terms of Service for each platform, have a responsible browser-automation stack available, and plan for rate limiting and anti-bot handling. If you operate in restricted regions or behind corporate egress controls, verify proxy/VPN configuration separately (the skill only suggests them; it does not supply credentials). If you are concerned about autonomous behavior, consider disabling autonomous invocation or restricting the agent's network egress so scraping traffic is monitored and rate-limited.

Like a lobster shell, security has layers — review code before you run it.

behancevk97376jq3mm5ne24hcpqeyzda584c98pdesign-searchvk97376jq3mm5ne24hcpqeyzda584c98pdribbblevk97376jq3mm5ne24hcpqeyzda584c98pinspiration searchvk97376jq3mm5ne24hcpqeyzda584c98platestvk97376jq3mm5ne24hcpqeyzda584c98ppinterestvk97376jq3mm5ne24hcpqeyzda584c98ppublic-webvk97376jq3mm5ne24hcpqeyzda584c98ppulic searchvk97376jq3mm5ne24hcpqeyzda584c98p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments