Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (gathering public Huawei AppGallery pages, rules, distribution info, help) aligns with the SKILL.md content. The skill requires no binaries, env vars, or installs — consistent with a web-scraping/aggregation helper for public content.
Instruction Scope
SKILL.md explicitly limits actions to publicly visible pages (homepage, developer docs, help center, announcements), requires preserving source and date, and explicitly forbids interacting with private developer backends, credentials, signature/cracking guidance, or policies evasion. It does not instruct reading local files or unrelated env vars.
Install Mechanism
There is no install specification and no code files (instruction-only). This is the lowest-risk model: nothing will be written or executed on disk by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths — proportionate for a public-information aggregator.
Persistence & Privilege
always is false, it does not request modification of other skills or system-wide settings, and it does not request persistent privileges. Model invocation is allowed (the platform default) which is appropriate here.
Assessment
This skill appears coherent and low-risk: it only summarizes public Huawei AppGallery pages and asks for no credentials or installs. Before installing, confirm you are comfortable with the agent accessing external web pages (it may copy text from those pages), and verify outputs before relying on them because store rules change frequently. Note: the skill's source is 'unknown' and there is no project homepage beyond the AppGallery link — if provenance matters to you, ask the publisher for contact or repository information. If you want to limit risk further, run it with web access constrained or review its results manually rather than granting it autonomous actions that might post or act on the extracted information.Like a lobster shell, security has layers — review code before you run it.
latestvk97b5wah3xqbdyk1cd97bpv9cx83fnkm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
