Find Vendors

v1.0.0

Find suppliers, manufacturers, service providers, fulfillment partners, and sourcing options for ecommerce workflows. Use when the user wants help finding ve...

0· 130·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, inputs, and workflow align: the skill is for sourcing vendors and does not request unrelated capabilities, binaries, or credentials.
Instruction Scope
Runtime instructions are limited to clarifying needs, searching public vendor/sourcing signals, comparing fits, and returning a prioritized shortlist. The instructions do not ask the agent to read local files, environment variables, or transmit data to unexpected endpoints. They are reasonably scoped, though somewhat high-level about where/how to search (public web/search signals).
Install Mechanism
No install spec and no code files — instruction-only skill means nothing is written to disk or installed, which is the lowest-risk option.
Credentials
No required environment variables, credentials, or config paths are declared or referenced; requested inputs are domain-relevant (product, geography, budget, etc.).
Persistence & Privilege
always is false and there is no indication the skill requests permanent presence or modifies other skills or system configuration.
Assessment
This skill appears coherent and low-risk: it uses public information and asks for no credentials or installs. Before using it, avoid pasting sensitive or proprietary documents or credentials into prompts; verify any vendor claims independently (references, certifications, sample orders), and treat the agent's shortlist as research starting points rather than vetted approvals. If you need the assistant to access private data (contracts, internal supplier lists), consider manually redacting sensitive details or performing that verification outside the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk9730zrqegyp3ffk9snety5h6n837xqz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments