weibo realhot
v1.0.0实时抓取微博实时、生活、文娱、社会四大分类的热门搜索词条,返回标准化热搜数据列表。
⭐ 0· 80·0 current·0 all-time
bySherman Schulist@miaoxingjun
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description say: scrape Weibo hot searches. Included SKILL.md, README, and Python script implement exactly that (visiting s.weibo.com URLs and extracting titles/hot counts). No unrelated services, credentials, or system access are requested.
Instruction Scope
Instructions and script stay within scraping scope (open a browser, load the Weibo URL, parse elements). The docs recommend anti-detection measures and using proxies; that is common for scrapers but increases legal/ethical risk and should be considered by the user. The README references a Windows workspace path (documentation-only) but the runtime code is generic.
Install Mechanism
This is instruction-only (no automated install spec). The README recommends installing selenium and webdriver-manager but the repository does not install drivers automatically; users must provision a compatible browser and driver. No remote downloads, no obscure URLs, and no archive extraction in the skill itself.
Credentials
The skill requests no environment variables, no credentials, and no config paths. All required external resources are public Weibo pages; no secret exfiltration is present in the code.
Persistence & Privilege
always is false and the skill does not attempt to modify other skills or agent-wide settings. It does start local browser processes when invoked (normal for a scraper).
Assessment
This skill appears coherent and implements what it claims: a Selenium-based scraper for Weibo hot-search pages. Before installing/using it: (1) be prepared to install Python dependencies (selenium, webdriver-manager) and a compatible browser driver (Chrome/Edge); the repo does not auto-install them. (2) Scraping anti-detection recommendations (changing fingerprints, using proxies) are present in the docs — these are common but can raise legal/ToS issues; do not use evasion techniques without understanding the site's terms and applicable law. (3) Keep request frequency low (docs recommend it) to avoid IP blocking. (4) Run the script in a controlled environment because it launches a real browser process and may consume resources. If you need the agent to run this autonomously, verify operational policies and ensure you supply appropriate infrastructure (browser drivers, network access) and compliance checks.Like a lobster shell, security has layers — review code before you run it.
latestvk971166xajx2z3qph72dmghh7983q3ca
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
