ecommerce-market-analyzer-skill
v1.0.0Scrape e-commerce homepages from multiple websites in a target market, handle popups automatically, capture screenshots and HTML, extract product data, and g...
⭐ 0· 123·1 current·1 all-time
bynepp@nepp-an
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (e‑commerce market scraping and analysis) aligns with the included artifacts: SKILL.md, reference pattern files, report template, and a Playwright scraper script that captures screenshots and HTML and contains parsing patterns for targeted e‑commerce sites. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md instructs the agent to run the included Playwright scraper, save screenshots and HTML, then analyze files locally (image reading, grep, regex parsing). All of that is within the stated workflow. Note: the instructions tell the agent to 'immediately run the scraper' when given a website list — this will cause network crawling and file writes; users should be aware the skill performs autonomous web requests and local I/O.
Install Mechanism
There is no external install spec or remote download; the skill is instruction + bundled script. Dependencies (Playwright, Python) are documented in README. No suspicious download URLs or archive extraction steps are present.
Credentials
The skill requests no environment variables or credentials. The script operates with local filesystem writes only (screenshots_clean/*.png and .html). No evidence it accesses or requests unrelated secrets or system configs.
Persistence & Privilege
Skill flags are default (always:false) and do not request permanent elevated privileges. It does write files to a local output directory (expected for scraping) but does not modify other skills or global agent configuration.
Assessment
The skill appears coherent with its stated purpose, but take these precautions before running: 1) Review the included scripts manually—only run code you trust. 2) Run the scraper in an isolated environment (VM/container) to limit risk and disk usage. 3) Install Playwright and dependencies according to the README in a controlled venv. 4) Respect robots.txt and target sites' Terms of Service; avoid scraping behind authentication or paid/content-restricted areas. 5) Start with a small site list and low request rates (the script already has delays) to reduce anti-bot triggers. 6) Be aware the tool saves full HTML/screenshots locally—don’t include sites containing sensitive personal data. If you want higher assurance, ask the maintainer for provenance (homepage, repo) or run the code through your static analysis toolchain before use.Like a lobster shell, security has layers — review code before you run it.
latestvk9767dxept6szevt4m86yxdzp1837mgg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
