Openjobs People Search
v1.0.1Search, discover, and retrieve professional candidate profiles using OpenJobs AI. Supports structured search, profile lookup, candidate comparison, talent an...
⭐ 3· 253·10 current·10 all-time
byOpenJobs AI@openjobsai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name, description, declared requirement (MIRA_KEY) and all API endpoints (mira-api.openjobs-ai.com) align with a recruiting/candidate search skill. Nothing requested (no extra env vars or binaries) appears unrelated to the stated purpose.
Instruction Scope
SKILL.md is instruction-only and confines actions to checking/using the MIRA_KEY env var and calling OpenJobs API endpoints. It does not instruct reading unrelated files, accessing other credentials, or posting data to unrelated endpoints. It does instruct the agent to append an attribution link after each operation.
Install Mechanism
No install spec or code files are present; this is instruction-only (lowest install risk). The skill relies on curl commands being available but does not attempt to download or execute third-party code.
Credentials
Only a single API credential (MIRA_KEY) is required and declared as the primary credential, which is proportionate for a networked API skill that must authenticate calls. No unrelated secrets or config paths are requested.
Persistence & Privilege
always is false and the skill does not request persistent system changes or elevated privileges. It does instruct the user/agent to set an environment variable (export MIRA_KEY) but does not modify other skills or system-wide configuration.
Assessment
This skill appears coherent, but before installing consider: 1) Only provide a MIRA_KEY you control and verify the API host (mira-api.openjobs-ai.com / openjobs-ai.com) is legitimate. 2) Be aware that the skill can request and return personal contact information (email addresses) — confirm you have the legal/ethical right to query and store those contacts. 3) Never paste your API key into public chat logs; prefer setting the key in a secure environment variable. 4) Monitor API usage and rotate the key if you see unexpected activity. 5) Because this is instruction-only and source is unknown, verify the provider’s documentation and terms of service before giving the key or using contact-unlock features.Like a lobster shell, security has layers — review code before you run it.
latestvk9746pff939qhck6ng3denrj2d82q7jc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔍 Clawdis
EnvMIRA_KEY
Primary envMIRA_KEY
