Weibo Timeline Monitor

v0.1.4

用于监控微博关注流,先切换到最新微博时间线,再按发帖时间抓取并去重写入每日 Markdown,减少关键微博漏看。

0· 861·9 current·10 all-time
byHanWenbo@hwb96
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (monitor Weibo timeline, write Markdown digests) match the declared requirement (browser.enabled) and the SKILL.md and reference docs. No unrelated env vars, binaries, or unexpected service credentials are requested.
Instruction Scope
Runtime instructions require using the browser tool with profile=openclaw and target=host to open weibo.com, click the left "最新微博", extract posts, fetch detail pages when truncated, parse times, and write into ~/weibo-digest/YYYY-MM-DD.md. This is coherent, but it necessarily uses the user's logged-in browser session (cookies/session state) to access weibo — the SKILL.md warns not to persist credentials, but the agent will have access to the active session, which is sensitive and worth noting.
Install Mechanism
No install spec; only an included helper script (scripts/install_cron.sh) that writes a prompt file and calls openclaw cron add. No remote downloads or archive extraction are present.
Credentials
The skill requests no environment secrets or unrelated credentials. The only declared requirement is browser.enabled, which aligns with needing an authenticated browser profile to access Weibo.
Persistence & Privilege
always:false (not force-included). The provided script creates a prompt file under ~/.openclaw/prompts and registers a recurring OpenClaw cron job (openclaw cron add) so the task can run periodically. This persistence is expected for a scheduled monitor but means the skill will run repeatedly with access to the browser profile — run in an isolated profile if you want to limit exposure.
Assessment
This skill appears to do what it says: it uses your logged-in OpenClaw browser profile to scrape Weibo and writes daily Markdown files. Before installing, consider: (1) run it with an isolated browser profile instead of your main account to limit exposure of cookies/session data; (2) inspect scripts/install_cron.sh (it creates ~/.openclaw/prompts/<name>.prompt and registers an OpenClaw cron job) and delete that prompt/cron when uninstalling; (3) avoid using it with accounts holding sensitive access you don't want an automated agent to use; and (4) if you prefer manual runs, do not run the install_cron.sh and invoke the skill only on demand.

Like a lobster shell, security has layers — review code before you run it.

automationvk97dtryp4yd801q55hbsx6qc1h824ktwlatestvk97dtryp4yd801q55hbsx6qc1h824ktwweibovk97dtryp4yd801q55hbsx6qc1h824ktwzh-cnvk97dtryp4yd801q55hbsx6qc1h824ktw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧭 Clawdis
Configbrowser.enabled

Comments