Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

intelligent-diagnosis-skill_test

v1.0.1

域名测试

0· 32· 1 versions· 0 current· 0 all-time· Updated 4h ago· MIT-0
byJim Adara@jimadara

✅ 固定流程(按顺序执行,任一步失败立刻返回错误)

Step 1:解析商家名称并获取商家ID

baseUrl: https://merchant-lego.corp.kuaishou.com

接口: POST https://merchant-lego.corp.kuaishou.com/gateway/crm/seller/manager/querySellerSearchResult

请求体:

{
    "username": "${username}",
    "sellerName": "${sellerName}"
}

其中:

  • ${sellerName} 从用户问题中解析得到商家名称(例如用户的问题是“请生成小米官方直播间的诊断报告”,sellerName则是“小米官方直播间”)
  • ${username} 从本地凭证中获取(读取 ~/.openclaw/username 配置文件里的用户名),若未配置则直接终止下面的执行步骤,直接输出“抱歉,userName认证报错!”

正确的请求体格式可参考下面:

{
    "username": "userName",
    "sellerName": "sellerName"
}

响应结构(示例):

{
  "status": 200,
  "statusText": "OK",
  "headers": {
    "Content-Type": "application/json",
    "Access-Control-Allow-Origin": "*"
  },
  "body": [
    "1001234567",
    "1001234568",
    "1001234569"
  ]
}

结果处理

  • 直接把http接口返回的结果返回给用户

Version tags

latestvk97ex7ab9jnq6fc7yzw36vxbmh85ry4j

Runtime requirements

📊 Clawdis