Worktile

v0.1.0

Extract and summarize public project and announcement information from Worktile shared pages without requiring login or accessing private data.

0· 82·0 current·0 all-time
byClawKK@codekungfu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (extract public Worktile share pages) align with the SKILL.md: all described actions are web page visits and parsing of public content. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Runtime instructions focus on visiting public share pages, waiting for dynamic rendering, extracting titles/metadata/task stats and summarizing — they do not instruct reading local files, accessing unrelated secrets, or posting data to third-party endpoints. The guidance to respect frequency control and only handle public pages limits scope.
Install Mechanism
Instruction-only skill with no install spec and no code files; nothing is written to disk or downloaded during install, which is the lowest-risk posture.
Credentials
No environment variables, credentials, or config paths are requested. The declared needs (none) are proportionate to a web-scraping/summary skill.
Persistence & Privilege
always is false and the skill does not request persistent system-wide privileges or modify other skills. Autonomous invocation is allowed (platform default) but not elevated by this skill.
Assessment
This skill appears coherent and limited to publicly shared Worktile pages. Before installing, consider: (1) confirm you only intend to analyze public share links (do not feed private/team links), (2) verify compliance with Worktile's terms of service and robots.txt, and (3) be aware the agent will access external URLs when invoked — if you restrict network access for agents, grant it only if you trust the skill. Because this is instruction-only with no declared author/site, you may also prefer to test it in a controlled environment first.

Like a lobster shell, security has layers — review code before you run it.

latestvk974848w1ehrf3hqr9zrxvjmmx8393z0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments