Smart Web Scraper
v1.0.0Extract structured data from any web page. Supports CSS selectors, auto-detection of tables and lists, JSON/CSV output formats. Use when asked to scrape a we...
⭐ 0· 2.2k·13 current·13 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name, description, README, SKILL.md examples, and the included Python script all align: they implement HTML scraping, table detection, link/structure extraction, and crawling. There are no unrelated environment variables, binaries, or config paths requested.
Instruction Scope
SKILL.md instructs running the included script (e.g. `uv run ... python scripts/scraper.py`) and documents options like respecting robots.txt, delay, and --ignore-robots. The instructions do not ask for unrelated system reads or credentials. Note: examples use `uv run --with` to auto-install dependencies at runtime — this will pull packages (beautifulsoup4, lxml) from package sources when executed.
Install Mechanism
No install spec is present (instruction-only install), and the script relies on common Python libraries. No downloads from unknown URLs or archive extraction are present in the provided code. The only install-like behavior implied is runtime package install via the example `uv run --with`, which is expected for Python dependencies.
Credentials
The skill requires no environment variables, credentials, or config paths. The script performs network requests to target URLs (expected for a scraper) and does not reference other system secrets in the visible code.
Persistence & Privilege
The skill is not always-enabled and uses normal model invocation defaults. It does not request permanent presence or modify other skills; its operations are local (fetching remote pages and printing or writing outputs).
Assessment
This skill appears coherent and implements a normal static-HTML scraper. Before installing or running: (1) Review the full scripts/scraper.py file yourself (the provided view was truncated here) to confirm there are no hidden network callbacks or unexpected behavior; (2) Run it in a sandbox or limited environment first to ensure it only fetches the target sites and does not contact unknown endpoints; (3) Be mindful of legal/terms-of-service and robots.txt — the tool can override robots rules with --ignore-robots; (4) Note that runtime dependency installation (e.g., via `uv run --with` or pip) will fetch code from PyPI — only install packages you trust; (5) Do not supply unrelated credentials (none are required). If you need higher assurance, ask the publisher for a source repository or sign-off and verify the remaining (truncated) portion of the script.Like a lobster shell, security has layers — review code before you run it.
automationvk976ssmzgrb73m4b8cg275fynh81pw8cdatavk976ssmzgrb73m4b8cg275fynh81pw8clatestvk976ssmzgrb73m4b8cg275fynh81pw8cscrapingvk976ssmzgrb73m4b8cg275fynh81pw8cwebvk976ssmzgrb73m4b8cg275fynh81pw8c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
