Robots Ai
v1.0.0Analyze and generate robots.txt files with AI crawler awareness. Detect which AI bots (GPTBot, ClaudeBot, PerplexityBot, Google-Extended, etc.) are blocked o...
⭐ 0· 102·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (robots.txt analysis/generation with AI-crawler awareness) match the SKILL.md instructions. The skill requires no binaries, credentials, or config paths — appropriate for an instruction-only robots.txt helper.
Instruction Scope
SKILL.md explicitly tells the agent to fetch /robots.txt from arbitrary websites, parse User-agent/Allow/Disallow rules, and produce suggested robots.txt content. That behavior is expected for this purpose, but it implies the agent will perform network fetches of target sites (and may reveal provided site URLs to any runtime network logs). The instructions do not request unrelated files, credentials, or external endpoints beyond the target site's robots.txt.
Install Mechanism
No install spec and no code files are present — lowest-risk instruction-only skill. Nothing is downloaded or written to disk by an installer.
Credentials
The skill declares no required environment variables or credentials. No disproportionate access to secrets or unrelated services is requested.
Persistence & Privilege
always is false and the skill does not request special persistent privileges or modifications to other skills/configs. Autonomous invocation is allowed by default but not excessive here.
Assessment
This skill appears coherent and safe in intent. Before installing, note that: (1) it will fetch robots.txt from arbitrary URLs you provide — ensure you are comfortable with the agent making outbound requests to those sites and with any logs that may record those URLs; (2) generated recommendations (e.g., 'block all AI' or blocking Googlebot) can have major consequences like removing your site from search/indexing — review generated robots.txt carefully before applying it to production; (3) verify the bot list if you rely on it for compliance, since crawler names and behaviors can change. If you plan to use it on private/internal sites, ensure the agent has appropriate network access and that no sensitive URLs are shared accidentally.Like a lobster shell, security has layers — review code before you run it.
latestvk977prd20ntzhskwnfn8nwa42983a9e4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
