mkts Market Data
v1.0.11Real-time market data, portfolio tracking, trade journaling, screening, and news for stocks, crypto, ETFs, commodities, and forex — no API key required to start
⭐ 4· 878·1 current·1 all-time
byStephen@sdliriano
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (market data, portfolio tracking, news) match the runtime instructions: all documented operations are HTTP calls to https://mkts.io/api/v1 and the declared runtime dependency is only curl. The optional MKTS_API_KEY is appropriate for the described optional higher-rate access.
Instruction Scope
SKILL.md contains concrete curl examples targeting mkts.io endpoints (market, assets, screener, news, etc.). It does not instruct the agent to read unrelated files, scan system paths, or exfiltrate unrelated credentials. The only outbound target documented is the mkts.io API and its RSS/news sources.
Install Mechanism
This is an instruction-only skill with no install spec or code to download or execute. That minimizes on-disk risk and matches the stated simple curl-based usage.
Credentials
No required environment variables; an optional MKTS_API_KEY is documented and used in examples. There are no unrelated secrets or config paths requested.
Persistence & Privilege
Skill is not always-enabled and follows platform defaults for invocation. It does not request modification of other skills or system-wide settings.
Assessment
This skill appears internally coherent and limited to calling the mkts.io API using curl. Before installing: (1) Verify the mkts.io domain/service reputation (homepage and source are not provided here). (2) If you register programmatically, be aware you'll POST an email to mkts.io to obtain a key — avoid sending any sensitive or private credentials in those requests. (3) Treat the optional API key like any secret (store it securely if you add it to the agent). (4) If you want extra assurance, test with a throwaway email and inspect outbound requests to confirm behavior.Like a lobster shell, security has layers — review code before you run it.
latestvk97fq9bnczstbw4vxbe0ydgs3h82mgca
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
Binscurl
