Clawdbot Documentation Expert
v1.2.2Clawdbot documentation expert with decision tree navigation, search scripts, doc fetching, version tracking, and config snippets for all Clawdbot features
⭐ 280· 34.9k·506 current·539 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description, SKILL.md, snippets, and the included scripts all focus on discovering, fetching, indexing, and surfacing Clawdbot docs; the requested capabilities (sitemap, search, fetch, track-changes) are coherent with the stated purpose.
Instruction Scope
Runtime instructions direct the agent to run the provided scripts and to fetch docs from docs.clawd.bot; they do not ask the agent to read unrelated system files or request unrelated secrets. The scope stays within documentation navigation and retrieval.
Install Mechanism
There is no install spec (instruction-only), which minimizes install risk. The skill does reference external tooling (qmd) for full-text indexing, but it does not itself download arbitrary archives or run an installer.
Credentials
The skill declares no required environment variables, credentials, or config paths. This is proportionate to its documented function. Note: the scripts will perform network fetches and may write snapshots to disk (track-changes), but they do not request secrets in the metadata.
Persistence & Privilege
The skill is not marked always:true and requests no special privileges. Model invocation is not disabled (default allows the model to call the skill autonomously), which is typical for helper skills but worth noting if you want explicit user confirmation before running scripts.
Assessment
This skill appears to be a coherent documentation helper for Clawdbot and doesn't ask for keys or installs. However, it includes small shell scripts that will fetch docs from the network and create local snapshots/indexes. Before installing or enabling the skill: 1) Inspect the contents of the scripts (build-index.sh, fetch-doc.sh, track-changes.sh, etc.) to confirm they only access docs.clawd.bot and do not exfiltrate local files. 2) Run the scripts in a sandbox or with network controls if you are concerned about network writes. 3) Check package.json for any unexpected dependencies. 4) If you prefer to prevent autonomous actions, disable model invocation for this skill or require explicit user consent before the agent runs any scripts.Like a lobster shell, security has layers — review code before you run it.
latestvk971f45xa0d098ebgmgbmdg8m57z390x
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
