Operate Web Apps Built by Forguncy (aka 活字格)

v1.0.2

Provides functionality to interact with SpreadJS tables in the web applications built by Forguncy (aka 活字格), specifically for extracting table data and colum...

0· 209·0 current·0 all-time
by宁伟@kadbbz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md: all content is about locating 'fgcname' and reading SpreadJS tables via in-page JS. No unrelated credentials, binaries, or installs are requested.
Instruction Scope
Instructions are limited to DOM inspection and SpreadJS API calls run in the browser evaluate context (browser.act). They do not request unrelated files, system config, or external endpoints. They explicitly require a targetId from browser.open/snapshot, which is appropriate.
Install Mechanism
No install spec and no code files — instruction-only. This minimizes disk persistence and installation risk.
Credentials
No environment variables, credentials, or config paths are requested. The skill relies solely on running JS inside the target web page, which is proportional to the described functionality.
Persistence & Privilege
always is false and there is no self-modifying installation. The skill does not request elevated or persistent privileges beyond the normal ability to execute browser.evaluate scripts.
Assessment
This skill runs arbitrary JavaScript inside a web page's context to read Forguncy/SpreadJS tables, so only use it on pages you trust and that actually host Forguncy/SpreadJS (it expects global Forguncy and GC.Spread objects). Because it executes in-page JS, it can access any data visible in the page — avoid using it on pages with sensitive information unless you trust the agent and environment. There are no extra installs or credentials requested. If you want extra assurance, test the snippets manually in the browser console on a safe sample page before enabling automated runs.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780a5hdzbfvashjh80nnwfmd82vmsa

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments