Postcat

v0.1.0

整理公开产品与文档页信息,提供功能摘要、版本说明、开源链接及文档目录查询服务。

0· 117·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description ask for public page summarization and the skill requests no env vars, binaries, or installs — all proportional to that purpose. Minor metadata inconsistency: registry metadata lists no homepage while SKILL.md includes https://postcat.com/ (small provenance note, not a functionality mismatch).
Instruction Scope
SKILL.md confines actions to fetching and extracting information from public pages, respecting rate limits and not accessing accounts, local files, or writing to projects. It does mention waiting for dynamic page loads (i.e., JS rendering), which is a runtime capability requirement of the platform rather than the skill itself.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk or downloaded by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested; the declared scope (public pages only) justifies this.
Persistence & Privilege
No elevated persistence requested (always:false). The skill is user-invocable and can be invoked autonomously by the agent per platform defaults, which is expected for skills of this type.
Assessment
This skill appears coherent and low-risk: it only instructs the agent to read and summarize publicly available product and documentation pages and asks for no secrets or installs. Before installing, consider: (1) verify the claimed homepage (https://postcat.com/) and the skill author's reputation since registry source is 'unknown'; (2) confirm your agent platform's browsing/networking rules — the skill assumes the agent can render JS and fetch pages, and any network-capable agent could access pages you don't intend it to if misused; (3) ensure the agent will not be directed to use credentials or to scrape non-public resources; and (4) monitor outputs for accidental inclusion of sensitive data. If you need stronger assurance, ask the publisher for provenance or a link to the upstream project/repository.

Like a lobster shell, security has layers — review code before you run it.

latestvk973aym3rvsm1e1jj5vv5aq8cd834bn8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments