AI Trending Radar
v1.0.0This skill should be used when the user wants to discover, collect, or summarize the latest trending and viral open-source AI or LLM projects. Triggers inclu...
⭐ 1· 23·0 current·0 all-time
byLeon Stark@leon0401
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description request trending AI projects and the included script plus SKILL.md perform web fetches from GitHub, HuggingFace, arXiv, Papers With Code, Hacker News, Twitter/X, Reddit, etc. All required resources and actions align with the stated purpose; no unrelated binaries or credentials are requested.
Instruction Scope
Runtime instructions are limited to running the included fetcher or performing web searches against the listed sources, deduplicating, ranking, and producing a Markdown report. The SKILL.md does not instruct the agent to read local files, environment secrets, or send data to unknown third parties. It does instruct the agent to fetch social-media content and repository metadata (expected for this task).
Install Mechanism
No install spec — instruction-only with a single Python script included. This minimizes disk-write/remote-install risk. The script uses Python stdlib (urllib) and does not pull external packages at install time.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. The script also does not read environment variables or local credential files in the visible code. Outbound network access to public APIs is necessary and proportional to the purpose.
Persistence & Privilege
The skill is not force-installed (always:false) and does not request persistent or elevated privileges. It produces local output (trending_report.json per SKILL.md) which is reasonable for a reporting tool.
Assessment
This skill appears coherent and limited to collecting public metadata from open sources. Before running: (1) be aware it will make outbound HTTP(S) requests to public services (GitHub, HuggingFace, arXiv, PapersWithCode, HN, social platforms); ensure network access is acceptable in your environment. (2) The included script writes a JSON report (trending_report.json) — review it or run in a sandbox if you prefer. (3) The arXiv endpoint is requested over HTTP in the script (export.arxiv.org); consider updating to HTTPS if you need encrypted fetches. (4) If you will run this in a sensitive environment, inspect the full script (the file is included) to confirm no additional behavior in the truncated portion modifies this assessment.Like a lobster shell, security has layers — review code before you run it.
latestvk979ecrbc5fjtrfj46sztf6j3d84d39b
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
