Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Jina Reader
v0.0.1Web content extraction via Jina AI Reader API. Three modes: read (URL to markdown), search (web search + full content), ground (fact-checking). Extracts clea...
⭐ 3· 3.9k·62 current·63 all-time
byEric Santos@ericsantos
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (web extraction via Jina Reader) match the implementation: the script calls Jina Reader endpoints (r.jina.ai, s.jina.ai, g.jina.ai). Declared binaries (curl, jq) are actually used. The single declared credential (JINA_API_KEY) is appropriate and used for Authorization.
Instruction Scope
SKILL.md and scripts only instruct the agent to call Jina's APIs with the provided URL/query and optional extraction parameters. The script does not read other files, environment variables, or system configuration, nor does it send data to endpoints outside Jina's domains. It builds HTTP headers from CLI flags and outputs returned JSON/markdown.
Install Mechanism
No install spec is provided (instruction-only with an included shell script). That is low-risk compared to arbitrary downloads. The bundle includes a plain bash script (no obfuscation or remote code fetch). Execution depends on local curl/jq which are declared and used.
Credentials
Only JINA_API_KEY is identified as the primary credential and the script uses it (optionally) for Authorization. No unrelated secrets or excessive env requirements are requested. The script does not attempt to access other environment variables or config paths.
Persistence & Privilege
The skill does not request permanent/always-on inclusion (always: false), does not modify other skills or system settings, and does not persist credentials itself. Autonomous invocation (model calling the skill) is the platform default and not a special privilege here.
Assessment
This skill appears to do what it says: it sends your URL or query to Jina Reader endpoints and returns extracted content. Before installing, consider: (1) anything you send (URLs, queries, or claims for fact-checking) will be routed to Jina's servers — review Jina's privacy and retention policies if that matters; (2) keep your JINA_API_KEY secret and only provide it if you trust Jina's service and billing; (3) the script requires curl and jq on the host; inspect the included reader.sh before running and be mindful of rate/cost for heavy use (the SKILL.md lists pricing and token usage). If you need full control over fetching (so your data never leaves your infrastructure), this skill is not suitable.Like a lobster shell, security has layers — review code before you run it.
latestvk9721r4c5txnzksyd5rkhhh14181gjk6
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📖 Clawdis
Binscurl, jq
Primary envJINA_API_KEY
