SEO Audit Report
v1.0.0Run comprehensive SEO audits on any website and generate actionable reports. Use when the user asks to audit a website's SEO, check technical SEO issues, ana...
⭐ 0· 246·0 current·0 all-time
byJohn Wang@johnnywang2001
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the contained script and checklist. The included Python crawler/parser and scoring functions are exactly what you'd expect for an SEO audit tool; no unrelated cloud credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md directs running scripts/seo_audit.py with URL arguments and saving reports to local files. The runtime instructions stay within the audit purpose. Note: the script performs HTTP requests and recursive crawling (depth option), which means it can scan any reachable URL you provide — avoid pointing it at private/internal endpoints unless you intend to.
Install Mechanism
No install spec; this is instruction-only plus a Python script that relies on stdlib only. Nothing is downloaded from third-party URLs or added to disk by an installer beyond the provided script.
Credentials
The skill requests no environment variables or credentials. The code uses only standard HTTP requests to target sites and does not reference other env vars or secret names.
Persistence & Privilege
always is false and the skill does not request elevated/system-wide persistence. It's an on-demand, user-invoked tool that writes reports locally per SKILL.md commands.
Assessment
This skill appears coherent and implements a local SEO crawler and reporter. Before installing, remember: (1) it will make HTTP requests to any URL you give it and can crawl multiple pages — do not audit private/internal sites unless you want that traffic generated; (2) review the remainder of the script if you require absolute assurance there is no hidden telemetry (the provided code shows only stdlib network calls and local report generation); (3) run it in a sandbox or isolated environment if you are uncertain about network access or want to limit outbound requests.Like a lobster shell, security has layers — review code before you run it.
latestvk9723rfg9kt3jed872h2zvcxgd82nh7j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
