jf-open-pro-ai-smart-search

v1.0.3

JF Tech Pro AI 智搜技能。根据语义内容(如"带帽子的人"、"车"、"狗")搜索杰峰云存报警视频,获取匹配的视频片段列表。使用场景:智能视频检索、AI 事件搜索、语义化视频查找。

0· 62·0 current·0 all-time
byJFTECH@jufengcloud
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (AI semantic video search for JF Tech cloud storage) match the included Python scripts and network endpoints. All required environment variables (JF_UUID, JF_APPKEY, JF_APPSECRET, JF_MOVECARD, JF_SN) are consistent with authenticating to the described JF Tech APIs.
Instruction Scope
SKILL.md and the scripts instruct only: read credentials from environment variables, call specified JF Tech HTTPS endpoints, and print results. The scripts do not execute shell commands or access other system files. Note: documentation text is inconsistent about whether JF_SN is optional or required; the actual code treats JF_SN as required.
Install Mechanism
No install spec; this is instruction-and-script-only. Nothing is downloaded or written by an installer. Risk from install mechanism is low.
Credentials
Requested environment variables are limited to the JF Tech credentials and parameters needed to sign API calls and identify a device. No unrelated secrets or third-party credentials are requested.
Persistence & Privilege
Skill does not request always:true, does not modify other skills, and does not persist or store credentials to disk. It runs as normal, user-invoked scripts with network access to the declared endpoints.
Assessment
This skill appears to do exactly what it says: call JF Tech AI search and playback APIs using credentials provided via environment variables. Before installing, ensure you trust the JF Tech endpoints (api.jftechws.com / api-cn.jftech.com) and are comfortable providing the required API credentials in the environment. Note the documentation inconsistency about JF_SN (the code requires it). Run the scripts in an isolated environment (or with least-privilege credentials), review the code yourself if you can, and rotate the app credentials if you later remove the skill or suspect misuse.

Like a lobster shell, security has layers — review code before you run it.

latestvk97809gpcsbtkjkj3t75x4v7yh84fn8z

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments