Find Wholesale Buyers

v1.0.0

Find wholesale buyers, retail buyers, importers, procurement targets, and volume-purchase opportunities for ecommerce and trade products. Use when the user w...

0· 98·0 current·0 all-time
byLeroyCreates@leooooooow
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (finding wholesale/volume buyers) matches the SKILL.md steps (clarify buyer profile, search public signals, shortlist). No unrelated credentials, binaries, or install steps are requested.
Instruction Scope
Runtime instructions are limited to clarifying requirements, searching public buyer/procurement signals, comparing candidates, and producing a prioritized shortlist. The instructions do not ask the agent to read local files, access unrelated env vars, or transmit data to external endpoints beyond the expected web research context. They do assume the agent has web/search capability, which is reasonable for this task.
Install Mechanism
No install spec or code files are present; the skill is instruction-only so nothing will be written to disk or downloaded during install.
Credentials
No environment variables, credentials, or config paths are required. The level of requested access is minimal and consistent with the described functionality.
Persistence & Privilege
always is false and the skill is user-invocable (normal). The skill does not request persistent or elevated platform privileges.
Assessment
This skill is instruction-only and coherent with its stated purpose. Before installing, consider: (1) the agent will likely perform web searches or use any browsing tools it has—ensure your agent's browsing/scraping settings and legal/scrape policies are acceptable; (2) avoid pasting sensitive trade secrets, proprietary supplier contracts, or private credentials into prompts when researching buyers; (3) verify any contact details or buyer claims independently before outreach; and (4) autonomous invocation is allowed by default on the platform (normal), so review when and how the agent can run skills automatically if you want tighter control.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fkzambz16cyvy7bjpw6p1zx8397c4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments