Jingyi Module
v0.1.0Help users use 精易模块 in 易语言. Search command names, fetch official docs, and generate directly runnable 易语言 code that the user can copy.
⭐ 0· 71·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included scripts and files: scripts perform local index search and fetch official docs from the listed homepage. Requiring the python binary is proportionate to the provided Python scripts.
Instruction Scope
SKILL.md instructs running the included search and fetch scripts. The fetch script performs POST requests to the official ec.ijingyi.com endpoint (expected for fetching docs). These instructions do not access unrelated system files or credentials, but they will send query params (command id/name) to the external site.
Install Mechanism
No install spec (instruction-only) and no downloads; included Python scripts are executed locally. This is the lower-risk pattern for skills.
Credentials
The skill declares no environment variables or credentials and the code does not request secrets. Network access to the documented external API is used and is appropriate for the stated functionality.
Persistence & Privilege
always is false and the skill does not request persistent/system-wide privileges or modify other skills' configs.
Assessment
This skill appears coherent and implements a retrieval-first workflow: it searches a local command index and calls the official ec.ijingyi.com API to fetch command docs, then helps generate 易语言 code. Before installing or running scripts, note: (1) the scripts will make network requests to ec.ijingyi.com (queries you run will be sent there); (2) the fetch script depends on the requests library and the included index file (data/command_index.jsonl) — inspect that file and the scripts if you have privacy concerns; (3) the build script expects a local export path if you rebuild the index (no unexpected external downloads). If you are comfortable with those network requests and with running Python scripts you reviewed, the skill is acceptable to use.Like a lobster shell, security has layers — review code before you run it.
latestvk974s9ehyhhab6y9vavw8q0wkh83w034
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspython
