Ozon Wildberries Analyzer
v1.0.0OZON and Wildberries marketplace deep analysis agent. Market intelligence for Russian e-commerce — category trends, competitor analysis, pricing strategy, ke...
⭐ 0· 166·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name, description, and command set all align: the skill is an analyzer for OZON and Wildberries and asks for product/category/competitor data. It does not request unrelated system access or credentials.
Instruction Scope
SKILL.md is instruction-only and expects the user to paste product data or competitor URLs; it does not include explicit network-scraping steps or require credentials. However the instructions are somewhat open-ended about how competitor data is acquired (user-provided vs fetched), which gives the agent discretion. It also directs creation of a ~/wb-ozon-tracker/ workspace.
Install Mechanism
There is no install spec and no code files — lowest-risk pattern. The skill allows the use of Bash for runtime operations (file creation, text processing), which is expected for an instruction-only tool but means runtime shell commands will be executed.
Credentials
The skill requests no environment variables, no credentials, and no config paths. This is proportionate to the stated capabilities and reduces the risk of secret exposure through the skill itself.
Persistence & Privilege
always:false (default) and autonomous invocation is allowed (normal). The skill writes a workspace under the user's home (~ /wb-ozon-tracker/), which is reasonable for storing analysis outputs but is persistent on disk and should be considered by the user.
Assessment
This skill is internally consistent and low-risk as provided, but consider: (1) It uses Bash to create and write files in ~/wb-ozon-tracker/ — check and clean that folder if desired. (2) Don’t paste sensitive credentials or proprietary spreadsheets into the skill prompt; the skill does not need API keys but will use whatever you input. (3) Clarify whether the agent will fetch competitor pages automatically (network access) or expects you to supply scraped data; if you prefer no outbound fetches, avoid providing competitor URLs or limit allowed-tools. (4) Monitor the first runs to review what shell commands are executed and the files produced. If you need stricter limits, remove Bash execution or run the analysis offline with vetted tooling.Like a lobster shell, security has layers — review code before you run it.
latestvk979ayd9dbd7p1am6431x7mn2n83fpwp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
