Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for shixiangyu2/huashu-book-pdf.
Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Book-PDF: 书籍级PDF手册全流程" (shixiangyu2/huashu-book-pdf) from ClawHub.
Skill page: https://clawhub.ai/shixiangyu2/huashu-book-pdf
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.
Command Line
CLI Commands
Use the direct CLI path if you want to install manually and keep every step visible.
Name/description match the included scripts and templates: init-project.sh, build.js, build-pdf.js and update.sh implement a research→write→merge→Playwright→PDF workflow. Declared runtime deps (Node.js, Playwright) are appropriate. The requirement to include specific brand/author info is part of the claimed output, so it's coherent though opinionated.
!
Instruction Scope
SKILL.md instructs agents to read local files (references/design-system.md and project research files) and even points to an external example path '01-公众号写作/_过程文件/openclaw-guide/' outside the template — this could prompt the agent to read arbitrary local paths if implemented verbatim. Fragments may include remote resources (fonts via Google Fonts @import, external images/links). The skill also mandates embedding specific branding/links in cover/backpage, which changes generated outputs automatically.
✓
Install Mechanism
No installer or external downloads are bundled; the skill is instruction + local scripts only. Users must have Node >=16 and install Playwright themselves. This is the low-risk pattern (no remote install URLs or archive extraction).
ℹ
Credentials
The skill requests no environment variables or credentials. However, build/render steps implicitly perform network requests (Google Fonts in CSS, any external image/CSS referenced in fragments). These are reasonable for rendering but can leak requests to third parties if fragments include remote URLs. Also templates reference relative paths to QR images (e.g., '../../知识星球/zsxq-qrcode.jpg') which may point outside the project.
✓
Persistence & Privilege
always:false and no code attempts to modify other skills or global agent settings. Scripts operate within the created project directory and write standard files (version.json, CHANGELOG, output/versions). No elevated persistence or system-wide changes observed.
What to consider before installing
This skill is generally coherent for producing book‑style PDFs with Node + Playwright, but review a few things before you run it:
- Requirements: you need Node >=16 and Playwright (npm install playwright + npx playwright install chromium). The scripts will create files and run local Node scripts.
- External network: the CSS imports Google Fonts and Playwright will load any remote resources referenced in your fragments (images, fonts, CSS). If you want to avoid leaking build metadata or making external requests, run Playwright in a network‑restricted environment or remove external URLs from templates.
- Local file reads: the SKILL.md references an example path outside the template (01-公众号写作/_过程文件/openclaw-guide/) and some fragment image paths point outside the project. Confirm the agents or tooling will only read the project folder you create, and not arbitrary host paths you don't intend to expose.
- Forced branding: templates and design-system require specific author/branding content in cover/backpage — check and modify these if you don't want that text/links in generated PDFs.
- Safe practice: inspect templates (build.js, build-pdf.js, update.sh, init-project.sh) yourself (they are small and readable), run the tooling in an isolated VM/container with limited network access, and do not place sensitive research materials in the project if you worry about remote requests from rendering.
Given these caveats (local file path references and outbound resource loads), proceed only after verifying/adjusting templates and build environment.
Like a lobster shell, security has layers — review code before you run it.