HH OpenClaw Agent

v1.0.6

HH OpenClaw Agent is a public ClawHub hh.ru application skill. Use it when the user says "hh openclaw agent", "hh job apply automation", "hh.ru browser appli...

0· 132·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for zack-dev-cm/hh-openclaw-agent.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "HH OpenClaw Agent" (zack-dev-cm/hh-openclaw-agent) from ClawHub.
Skill page: https://clawhub.ai/zack-dev-cm/hh-openclaw-agent
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install zack-dev-cm/hh-openclaw-agent

ClawHub CLI

Package manager switcher

npx clawhub@latest install hh-openclaw-agent
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included behavior: scripts create a packet, append execution steps, validate the bundle, and render a report. The required binaries (python/python3) are appropriate and no unrelated credentials or tools are requested.
Instruction Scope
SKILL.md confines actions to creating and managing local artifacts and instructs the operator to use an already-authenticated browser profile for live actions. The instructions explicitly forbid storing cookies/secrets in artifacts and treat login/2FA as operator-owned interruptions. The bundled scripts operate only on local files and do not make network calls.
Install Mechanism
No install spec; the skill is instruction-only with included Python scripts. Nothing is downloaded or extracted from external URLs, so there is no install-time code injection risk.
Credentials
The skill requests no environment variables or credentials. The scripts only read/write local JSON/markdown files and expect a repo_root for artifact checks; this is proportional to the described functionality.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes or modify other skills. It does not attempt to enable itself or store tokens; its scope is limited to local file operations.
Assessment
This skill appears to do what it says: manage local hh.ru application packets and render audited reports. Before installing/using it: (1) review the included scripts yourself (they operate on local files and are easy to inspect); (2) ensure you run them in an environment where artifact paths and screenshots live under the intended repo_root so the bundle checks are meaningful; (3) do not pass secrets, cookies, or absolute file paths into the packet (the README already warns against this); and (4) be cautious when using the --include-sensitive flag since it will un-redact cover letters and apply/outcome URLs. If you want extra assurance, confirm the GitHub homepage and repository commit history match the published package.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Any binpython3, python
applicationvk973sd71abjn88phkvt2y1yjks85e5nxautomationvk973sd71abjn88phkvt2y1yjks85e5nxbrowservk973sd71abjn88phkvt2y1yjks85e5nxcareervk973sd71abjn88phkvt2y1yjks85e5nxcareer-toolsvk973sd71abjn88phkvt2y1yjks85e5nxhhvk973sd71abjn88phkvt2y1yjks85e5nxjob-searchvk973sd71abjn88phkvt2y1yjks85e5nxjobsvk973sd71abjn88phkvt2y1yjks85e5nxlatestvk973sd71abjn88phkvt2y1yjks85e5nxopenclawvk973sd71abjn88phkvt2y1yjks85e5nx
132downloads
0stars
7versions
Updated 5h ago
v1.0.6
MIT-0

HH OpenClaw Agent

Search intent: hh openclaw agent, hh.ru apply, job application browser automation, career submission bundle

Goal

Turn one hh.ru application run into a reusable submission bundle:

  • one machine-readable application packet
  • one ordered execution log with evidence
  • one structural bundle check
  • one shareable markdown report

This skill is for reviewed hh.ru browser execution through OpenClaw. It assumes the browser profile is already authenticated.

Use This Skill When

  • the user wants to prepare and submit an hh.ru application through OpenClaw
  • a vacancy-specific packet should be reviewed before the live browser write
  • the same hh.ru response flow needs an auditable run log instead of chat memory
  • a blocked or failed submission needs screenshots, exact steps, and a handoff report
  • the operator wants one record of approved content and live browser outcome

Quick Start

  1. Initialize the application packet.

    • Use python3 {baseDir}/scripts/init_hh_application_packet.py --out <json> --packet-id <id> --vacancy-id <id> --vacancy-title <title> --company-name <company> --resume-title <resume> --vacancy-url <url> --apply-url <url> --cover-letter <text>.
    • Add --browser-profile, --review-status, --reviewer, and repeatable --blocked-action fields when needed.
  2. Execute the browser flow through OpenClaw.

    • Open the apply URL in a logged-in profile.
    • Record each meaningful browser action with append_hh_execution_step.py.
    • Capture screenshots and outcome notes as the run progresses.
  3. Keep operator-owned auth and approval gates explicit.

    • If hh.ru shows login, CAPTCHA, 2FA, or another auth challenge, stop and let the operator complete it in the same browser profile.
    • Do not live-send a packet that is still pending or rejected.
  4. Check the bundle before sharing or counting it as complete.

    • Use python3 {baseDir}/scripts/check_hh_submission_bundle.py --manifest <json> --repo-root <repo> --out <json>.
    • Fix approval-gate issues, missing screenshots, or incomplete failed-step notes before final handoff.
  5. Render the report.

    • Use python3 {baseDir}/scripts/render_hh_submission_report.py --manifest <json> --out <md>.
    • The default report redacts the cover letter body, keeps only public https://*.hh.ru/... URLs, and redacts private artifact paths.
    • Add --include-sensitive only when you intentionally need a full-content export.
    • Share the report instead of loose screenshots and manual notes.

Operating Rules

Packet rules

  • Keep one packet per vacancy response flow.
  • The cover letter should stay vacancy-specific.
  • Record vacancy URL, apply URL, resume title, and approval state before opening the live form.

Execution rules

  • Use a logged-in OpenClaw browser profile for the live hh.ru session.
  • Record expected result and actual result for every meaningful step.
  • Capture a screenshot for failed or blocked steps and for the final submitted state when possible.
  • Keep artifact paths relative so the bundle can move between machines.

Safety rules

  • Do not claim undocumented hh.ru write APIs.
  • Do not store cookies, secrets, or tokens in notes or artifacts.
  • Do not send a live application unless the packet review state is approved.
  • Treat login, CAPTCHA, passkey, and 2FA as operator-owned interruptions, not background automation.

Bundled Scripts

  • scripts/init_hh_application_packet.py
    • Create a machine-readable application packet for one hh.ru response flow.
  • scripts/append_hh_execution_step.py
    • Append one evidence-backed browser execution step to the packet.
  • scripts/check_hh_submission_bundle.py
    • Validate approval state, execution evidence, and bundle safety before handoff.
  • scripts/render_hh_submission_report.py
    • Render a concise markdown report from the packet and execution log.

Comments

Loading comments...