Weixin Article Reader

v0.1.1

Extract the title, author, publish date, and full body text from Weixin official account article links on mp.weixin.qq.com. Use this skill when a user wants...

0· 95·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description ask for extracting Weixin article fields and the bundle includes a small Python extractor that fetches mp.weixin.qq.com pages and parses title, author, publish date, and body — this matches expected capabilities.
Instruction Scope
SKILL.md instructs running the bundled script against mp.weixin.qq.com URLs. The script only performs an HTTP GET to the provided URL and HTML parsing; it does not read unrelated files, environment variables, or send data to other endpoints.
Install Mechanism
No install spec is present and the README/SKILL.md state the script uses only the standard library. Nothing is downloaded or written by an installer.
Credentials
The skill requires no environment variables, no credentials, and does not access config paths. The script uses only the provided URL and makes an outbound request to that URL (proportionate to the task).
Persistence & Privilege
always:false (default) and no system-wide modifications. agents/openai.yaml allows implicit invocation (normal platform behavior) but the skill does not request elevated or persistent privileges.
Assessment
This skill appears internally consistent and uses only standard Python to fetch and parse mp.weixin.qq.com article pages. Before installing, consider: (1) the script issues an outbound HTTP(S) request to the exact URL you provide — ensure you trust the URL and are comfortable with network access; (2) some Weixin pages may require cookies, JS, or be blocked, so extraction can fail or return empty content; (3) the agent is allowed to invoke the skill implicitly by default (platform normal), so if you want to avoid automatic retrievals, restrict invocation in your agent settings. If you need higher assurance, review the included script (scripts/extract_wechat_article.py) yourself; it contains no calls to external endpoints other than the target page and no credential handling.

Like a lobster shell, security has layers — review code before you run it.

contentvk97bmp684dvx2epva7ve0f99v183ydp5latestvk97bmp684dvx2epva7ve0f99v183ydp5wechatvk97bmp684dvx2epva7ve0f99v183ydp5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments