WeChat MP CN
v1.0.0微信公众号监控 - 文章监控、阅读量追踪、舆情分析(WeChat Official Account)
⭐ 38· 10k·93 current·101 all-time
byGuohongbin@guohongbin-git
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description (WeChat Official Account monitoring) match the SKILL.md content. Recommended approaches (official API, SDKs like wechatpy/easywechat, or third-party analytics) are consistent with the stated functionality.
Instruction Scope
The instructions are limited to monitoring workflows and tooling suggestions. They do not instruct the agent to read arbitrary files, access unrelated environment variables, or transmit data to unexpected endpoints. The SKILL.md correctly notes API authentication and rate-limit considerations.
Install Mechanism
No install spec and no code files beyond a package.json manifest — the skill is instruction-only so nothing will be written to disk or executed by default.
Credentials
The skill itself does not request any environment variables or credentials. It correctly states that using the official WeChat API requires authentication; if you choose to integrate those APIs or third-party services later, you will need to provide appropriate credentials — that is expected but not requested by the skill as distributed.
Persistence & Privilege
Skill has no 'always' flag and does not modify system or other skills' configurations. It does not request persistent presence or elevated privileges.
Assessment
This skill is a documentation/integration guide rather than executable code — it won't install anything or ask for secrets by itself. If you plan to implement the workflows it describes, be aware: (1) using the official WeChat API requires you to obtain and store credentials securely; (2) third-party analytics platforms (e.g., NewRank) and SDKs should be reviewed for privacy and trustworthiness before sharing data or keys; (3) scraping public search pages (Sogou, etc.) can trigger rate limits or violate terms of service — ensure compliance and use rate limiting; and (4) if you later install SDKs or automation scripts, review those packages' provenance before running them.Like a lobster shell, security has layers — review code before you run it.
latestvk97b7taz3g31n2nczrsqcg0bvd81f28t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📱 Clawdis
