Query Artblocks Data
v1.0.0Query Art Blocks on-chain data using the artblocks-mcp GraphQL tools. Use when fetching projects, tokens, artists, sales, traits, or any Art Blocks on-chain...
⭐ 0· 84·0 current·0 all-time
by@ryley-o
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description describe GraphQL access to Art Blocks on-chain data and the SKILL.md only documents use of GraphQL/domain-specific query tools (graphql_query, build_query, explore_table, etc.). There are no unrelated credential or binary requirements.
Instruction Scope
Instructions stay focused on query discovery, building, optimizing, and executing GraphQL against Art Blocks schema. They do not instruct the agent to read local files, access unrelated env vars, or transmit data to external endpoints beyond the described query endpoints. The only unusual item is the 'artblocks://about' resource reference—likely an internal platform resource for context.
Install Mechanism
No install spec and no code files — instruction-only skill with no archives or external downloads. This is the lowest-risk install profile.
Credentials
The skill declares no environment variables, credentials, or config paths. The documented queries operate on public on-chain data and do not require secrets or cloud credentials.
Persistence & Privilege
always:false and default model-invocation behaviour are appropriate. The skill does not request persistent system-wide changes or access to other skills' configs.
Assessment
This skill is coherent and low-risk: it only documents how to build and run GraphQL queries against Art Blocks data and requests no secrets or installs. Before installing, confirm (1) that the platform-provided tools referenced (graphql_query, build_query, explore_table, etc.) are the legitimate Art Blocks connectors you expect, and (2) what the 'artblocks://about' resource resolves to so you know what contextual data the skill will fetch. If you want to limit autonomous use, keep model-invocation disabled for agents or review invocations in your agent's audit logs, but that is optional since the skill itself doesn't request extra privileges.Like a lobster shell, security has layers — review code before you run it.
latestvk97bp3cckts8b8w45p0r4ga7pd8369kw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
