Find Resellers
v1.0.0Find resellers, stockists, secondary sellers, and channel resale opportunities for ecommerce and cross-border products. Use when the user wants help identify...
⭐ 0· 81·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, inputs, and workflow align: the skill is for identifying resale partners and does not request unrelated binaries, env vars, or config access.
Instruction Scope
Instructions are high-level and appropriate for the task (e.g., 'search public seller and channel signals'), but they leave method and data-source selection to the agent. This open-endedness is expected for a research-style skill but grants the agent broad discretion about where and how it gathers public information.
Install Mechanism
Instruction-only skill with no install spec or code files — nothing will be written to disk or pulled from external URLs at install time.
Credentials
No environment variables, credentials, or config paths are required or declared; requested access is minimal and appropriate for the stated purpose.
Persistence & Privilege
Default invocation settings (not always: true, model invocation enabled) are reasonable for a user-invocable research skill and do not grant permanent or unusual privileges.
Assessment
This skill is coherent and low-risk: it only provides a research workflow and asks the agent to look for public reseller signals. Before using it, consider whether you'll supply any proprietary or sensitive product details — avoid entering confidential SKUs, private pricing, or internal contact lists. Because the SKILL.md is intentionally open-ended, the agent may use web searches or scraping of public sites; verify any suggested contacts and evidence before outreach, and ensure you comply with local contact/privacy laws. If you want tighter control, ask the agent to only use specific sources or to report sources before performing any data collection.Like a lobster shell, security has layers — review code before you run it.
latestvk972pywd6gcw5n070h31mfbca1839smn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
