1688 Sourcing Agent
v1.0.0Your intelligent companion for mastering 1688.com procurement. This skill empowers international buyers with step-by-step guidance on supplier verification,...
⭐ 0· 170·0 current·0 all-time
by走过@1970168137
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill is a sourcing/supplier-vetting guide for 1688.com and only contains guidance, questionnaires, and templates. It does not request unrelated credentials, binaries, or system access that would be disproportionate to a sourcing assistant.
Instruction Scope
SKILL.md instructs the agent to provide educational guidance, checklists, negotiation scripts, and report templates. Asking users to request supplier documents, photos, and videos is appropriate for supplier vetting and stays within the stated scope; there are no instructions to read local files, environment variables, or send data to unexpected external endpoints.
Install Mechanism
This is an instruction-only skill with no install spec and no code files—nothing is written to disk or downloaded during install, which is the lowest-risk install model.
Credentials
No environment variables, credentials, or config paths are requested. The guidance references user actions (e.g., installing a browser translate extension) but does not require any secret or broad access.
Persistence & Privilege
The skill is not set to always:true and doesn't request persistent system privileges or modify other skills. Autonomous model invocation is allowed by default (platform behavior) and is not in itself a concern here.
Assessment
This skill appears to be a legitimate educational sourcing assistant. Before using: do not paste or upload sensitive credentials or personal data into chats; verify any supplier documents independently (e.g., through official registries); prefer secure payment/trade-assurance methods and third-party inspection for large orders; be cautious when following translation/plugin recommendations—only install browser extensions from reputable sources; and treat supplier-provided materials (photos, videos, certificates) as part of your verification checklist rather than definitive proof.Like a lobster shell, security has layers — review code before you run it.
latestvk97dy7x66sdnegvf30hf75w809837xv7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
