Google Merchant Center Framework

v1.0.0

Google Merchant Center analysis and optimization framework. Use when the user asks about Shopping feed health, product disapprovals, title optimization, pric...

0· 55·0 current·0 all-time
byLuis Calderon@lac5q
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (GMC analysis & optimization) matches the SKILL.md content: questions to collect context, diagnostic frameworks, scoring, and optimization guidance. There are no unrelated requested binaries, env vars, or config paths.
Instruction Scope
Runtime instructions are limited to collecting user-provided context, asking follow-ups, applying diagnostic frameworks, and recommending fixes. The doc notes optional live access via a Google Merchant Center connection but does not instruct the agent to read local files, environment variables, or send data to unexpected endpoints.
Install Mechanism
No install spec and no code files — this is instruction-only, so nothing is downloaded, written to disk, or executed by the skill itself.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. The Integration Note reasonably references using a Merchant Center connection for live data; that implies credentials would be supplied by whatever MCP integration the platform provides, but the skill itself does not request unrelated secrets.
Persistence & Privilege
always is false and there is no install behavior that modifies agent config or requests persistent presence. Normal autonomous invocation is allowed by platform defaults but the skill does not escalate privileges.
Assessment
This skill is an offline decision framework for Google Merchant Center and appears coherent. Before using it with live data, connect to your Merchant Center only via the platform's official OAuth/connector (do not paste long account credentials into chat). Prefer least-privilege access scopes, and avoid pasting full feeds or customer PII in chat; instead provide redacted exports or allow the platform connector to fetch data. If you intend the agent to act on your GMC account, verify which scopes/actions it will be granted and revoke access when finished.

Like a lobster shell, security has layers — review code before you run it.

latestvk977m0dat064gjcagb71e8bn5h83veqz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments