Hacker new

v1.0.0

Fetch and analyze Hacker News (HN) content - the premier tech community for developers, AI researchers, and software engineers. Use when users need: (1) HN t...

0· 77·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (fetch and analyze Hacker News) match the instructions which call an x-cmd 'hn' command and use standard UNIX tools (jq/sed/sort). The declared file requirement (~/.x-cmd.root/X) aligns with the SKILL.md's explicit need to source the x-cmd environment.
Instruction Scope
Instructions are narrowly focused on fetching HN data and filtering it with x jq and standard shell tools. However, the skill requires you to source ~/.x-cmd.root/X before use — sourcing executes that file in your shell, so you must trust that file (and the x-cmd installation) because it can run arbitrary commands and affect your environment.
Install Mechanism
No install spec or code files are included; this is instruction-only and does not download or install artifacts. Lower-risk in that nothing is written/executed by the skill itself, but it relies on an external tool (x-cmd) which must be obtained separately.
Credentials
The skill requests no environment variables, credentials, or unrelated config paths. The single required path is the x-cmd initialization script which is reasonable for a wrapper that delegates work to x-cmd.
Persistence & Privilege
The skill is not always-on and does not request elevated or persistent privileges. It does not modify other skills or system-wide settings per the provided content.
Assessment
This skill is coherent for fetching and filtering Hacker News via the x-cmd tool. Before using it: (1) ensure x-cmd is installed from a source you trust; (2) inspect ~/.x-cmd.root/X before sourcing it (sourcing runs arbitrary code in your shell); (3) verify you have or install safe tools used by the examples (jq, sed, sort); (4) if you prefer to avoid sourcing a third-party init script, use the Hacker News API or hn.algolia.com directly or run equivalent commands only after reviewing x-cmd's installation instructions. No credentials are requested by this skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk97880kkrrk4cf0zfd5jxrxah983p13t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments