OpenTable Reservations

v0.1.1

Find and book restaurant reservations via OpenTable with date, time, party size, location, cuisine filters, or direct booking links for named restaurants.

0· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the code and instructions: scripts search OpenTable via the user's attached browser and build booking deep links. No unrelated env vars, binaries, or external services are requested.
Instruction Scope
SKILL.md constrains the agent to only use the included scripts and the OpenClaw browser primitives and explicitly forbids raw CDP scripting, web_fetch on opentable.com, and auto-completing bookings. The scripts run JS inside the user's attached browser to extract restaurant cards (expected behavior). Note: the evaluate JS runs in the user's browser context — if that browser session has unrelated sensitive tabs open, data exposure risk exists in principle, though the script itself targets OpenTable DOM selectors.
Install Mechanism
Instruction-only install (no remote download/install steps). Code is bundled with the skill (Python scripts). No network-based installers or archive extraction from untrusted URLs are used.
Credentials
No credentials, secret env vars, or config paths are requested. The only required runtime capability is access to an 'attached' browser profile and python3, which is appropriate for a skill that reads the user's OpenTable session and builds links.
Persistence & Privilege
always:false and the skill does not request permanent/automatic inclusion or modify other skills. It invokes the browser plugin at runtime; that is expected and proportionate to its function.
Assessment
This skill appears internally consistent: it uses your attached Chrome session to read OpenTable pages and then returns booking deep links (it explicitly stops before filling or submitting reservations). Before installing, confirm you are comfortable with the agent opening and evaluating pages in your existing browser profile (the skill requires an 'attached' profile and a logged-in OpenTable session). If you keep other sensitive tabs open in that browser, consider closing them first — the evaluate() JS is scoped to OpenTable selectors, but it runs inside your browser context. Because the skill's source/owner is 'unknown', review the bundled Python scripts if you want extra assurance (they are short and readable). Finally: the skill will not ask for credentials or perform network installs; in environments without the OpenClaw browser primitives it will fail rather than attempt forbidden fallbacks.

Like a lobster shell, security has layers — review code before you run it.

bookingvk97cd6xrghqg0xepfjns6tpxgn84pr46browservk97cd6xrghqg0xepfjns6tpxgn84pr46latestvk97cd6xrghqg0xepfjns6tpxgn84pr46opentablevk97cd6xrghqg0xepfjns6tpxgn84pr46reservationsvk97cd6xrghqg0xepfjns6tpxgn84pr46restaurantsvk97cd6xrghqg0xepfjns6tpxgn84pr46

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments