Find Distributors
v1.0.0Find regional distributors, wholesale channel partners, importers, and in-market distribution options for ecommerce and cross-border products. Use when the u...
⭐ 0· 86·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, inputs, and workflow align: the skill is meant to find and prioritize distributors and it requires no unrelated binaries, credentials, or config paths.
Instruction Scope
The SKILL.md keeps scope to public research ("search public distributor and channel signals") and producing a prioritized shortlist. However the instructions are high-level and permit broad discretion about what sources and methods to use (web search, scraping, paid databases, etc.). Consider clarifying allowed sources and limits (no private data collection, no automated outreach) to avoid scope creep.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing will be written to disk or executed as part of an installer.
Credentials
The skill declares no required environment variables, credentials, or config paths — consistent with its public-research purpose.
Persistence & Privilege
always is false and model invocation is enabled (normal). The skill does not request persistent or elevated privileges or modify other skills' settings.
Assessment
This skill appears to do what it says and asks for nothing sensitive, but the instructions are vague about how research is done. Before installing or running it: confirm (a) which public sources the agent may query (web search, LinkedIn, business registries, paid databases), (b) that it will not read or transmit any private/company documents or credentials, and (c) whether you need to provide any paid API keys for specific databases—only supply those if you trust the exact behavior and scope. If you want stronger limits, ask the skill author to add explicit source and privacy constraints in SKILL.md.Like a lobster shell, security has layers — review code before you run it.
latestvk97bk2swz8q0hqb5n9hz8npd4s839a25
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
