amz-hot-keywords
v0.1.0Scrape Amazon Brand Analytics (ABA) weekly hot keyword rankings from AMZ123 and return structured keyword trend data. Use when the user asks about Amazon key...
⭐ 0· 13·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, SKILL.md, workflow, and the Python scraper all align: they launch a headless Chrome session, navigate to amz123.com/usatopkeywords, scrape table rows, compute trends, and write CSV/JSON outputs. No unrelated services, binaries, or credentials are requested.
Instruction Scope
Instructions are focused on scraping and producing output files and include troubleshooting tips. They explicitly instruct running Selenium/Chrome, waiting for page elements, and optionally adding delays or rotating user agents to avoid bot detection. The docs also mention (optionally) adding credential handling if ABA becomes gated — this is not present in current code but is a potential extension. The script writes files to disk and prints the absolute path to stdout (expected behavior).
Install Mechanism
This is an instruction-only skill with no install spec. It relies on external prerequisites (Python 3.9+, Chrome, and Python packages like selenium and pandas) that must be installed by the user. That is reasonable for this task but means the environment must be provisioned manually; there are no automatic or opaque downloads in the package itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. The references mention python-dotenv as an optional extension for credential handling only if ABA becomes gated; currently no secret access is requested, which is proportionate to the stated scraping purpose.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or global agent configuration, and is not installed as a persistent system component. It runs ad-hoc and writes only local output files as documented.
Assessment
This skill appears internally consistent, but review and take precautions before running it:
- It automates a headless browser and accesses the public site amz123.com; ensure this activity complies with the site's Terms of Service and with any applicable rules (and avoid automated scraping where prohibited).
- You must install Chrome and Python packages (selenium, pandas); there is no automated installer included. Run the script in a controlled environment (container/VM) to limit risk.
- The script writes output files to the specified directory and prints the absolute path; avoid running it from directories containing sensitive files to prevent accidental exposure.
- The code currently does not request credentials, but the docs note optional credential handling for gated data — if that functionality is added later, treat any requested secrets (env vars, .env files, cookies) as high-risk and inspect the code before providing them.
- Because the scraper uses randomized sleeps and a custom user-agent, it could be adjusted to evade bot detection; if you are not comfortable with scraping tools, consider using a sanctioned API or obtain data through official channels.
Recommended actions before installing/using: inspect the script yourself or run it in a sandbox, confirm dependencies and Chrome are up-to-date, and start with a small max-results and a safe output directory (e.g., a dedicated data folder).Like a lobster shell, security has layers — review code before you run it.
latestvk975pvvfb0ycwg75p178dgaqp584h3ep
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
