playwright-download-fix

v1.0.1

自动处理 Playwright 下载文件名问题,监听下载事件并用正确的原始文件名保存文件。解决 Playwright 下载的文件名是 UUID 而不是原始文件名的问题。

0· 158·0 current·0 all-time
byUmeng+@squall0925
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, SKILL.md, README and included JS files all implement the same functionality (intercept Playwright 'download' events and save with suggestedFilename). No unrelated credentials, binaries, or permissions are requested.
Instruction Scope
Runtime instructions and examples focus on creating a Playwright context and using the DownloadHelper; they reference creating an alias and a local ~/.openclaw-autoclaw path (environment-specific but not malicious). Example scripts navigate to external sites (e.g., rd6.zhaopin.com) and suggest manual login — this is user-driven and could involve downloading sensitive data if the user logs into private accounts, so exercise caution and ensure compliance with site policies.
Install Mechanism
No install spec or network download in the skill; it's distributed as code files. There are no remote URLs, installers, or archive extraction steps in the package.
Credentials
The skill requires no environment variables, tokens, or external credentials. It uses the user's HOME to resolve '~/downloads', which is appropriate for a local downloader.
Persistence & Privilege
always is false and the skill does not request persistent platform-wide privileges or modify other skills. It only registers and removes Playwright page listeners within its own lifecycle.
Assessment
This package appears to do exactly what it says: saving Playwright downloads with their suggested filenames. Before running, inspect the files (download-helper.js, standalone-script.js), ensure you trust the environment and the download directory, install Playwright from the official registry, and be cautious when automating downloads from sites that require login or contain private data—do not use stolen credentials or violate a site's terms. Run it in a controlled environment if you have any doubts.

Like a lobster shell, security has layers — review code before you run it.

latestvk97078d2qkccm3wfqsk8prfj6n83dswj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments