Image Analysis Litiao

v1.0.0

Analyze images using browser and vision capabilities.

0· 662·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: SKILL.md documents opening image links, taking snapshots, and analyzing images. The declared requirement for a browser tool/Playwright is consistent with the stated purpose.
Instruction Scope
Instructions are narrowly scoped to opening image URLs, taking snapshots, and describing image content. They reference extracting image links from QQ messages which is within the described image-analysis use case. Note: the skill will fetch external URLs (images/pages) — expected for this purpose but you should only provide/trust accessible links.
Install Mechanism
No install spec or code is included (instruction-only), so nothing will be written to disk. The SKILL.md asks for Playwright to be fully installed but does not attempt to install it — this is a reasonable runtime requirement, though the skill relies on the host environment having Playwright/browser tooling available.
Credentials
The skill requests no environment variables, credentials, or config paths. This is proportional to its stated image-analysis functionality.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modify other skill configurations. Autonomous invocation is allowed by default but is not combined with any other concerning privileges.
Assessment
This skill is instruction-only and appears to do what it says: open image links in a browser, snapshot pages, and describe images. Before using it, ensure the runtime has Playwright/full browser support installed as the SKILL.md requires. Only provide or allow access to image URLs you trust (the skill will fetch external resources). There are no requested credentials or installs in the package itself. If you plan to let the agent run autonomously, remember it may fetch arbitrary remote images when invoked — limit exposure by controlling which links or message sources the agent may access.

Like a lobster shell, security has layers — review code before you run it.

latestvk978ab7dmxc8n95735erx50ts1832ne8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🖼️ Clawdis

Comments