Moltbook Trend Analysis
v1.0.0Fetch, analyze, and compare trending posts from Moltbook to inform your content strategy. Generates virality reports with real statistical benchmarks from 36...
⭐ 1· 70·0 current·0 all-time
by@smarvr
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (fetch & analyze Moltbook trending posts) align with the included scripts and README. Declared required binaries (bash, curl, python3), API base URL, and local snapshot/report directories are all appropriate and necessary for the stated functionality.
Instruction Scope
SKILL.md instructs the agent to call the Moltbook public API, save JSON snapshots under data/snapshots/, and write markdown reports to reports/. The scripts only read/write files under the skill folder, call the documented API endpoints, and do not attempt to read unrelated system files, environment secrets, or post data to unexpected endpoints.
Install Mechanism
There is no install spec; this is an instruction-and-script skill with no external installers or archive downloads. That minimizes install-time risk — the code delivered is the code that will run.
Credentials
The skill declares no required credentials and the scripts only use optional environment overrides (SUBMOLTS, TIMEFRAMES, PAGES, PAGE_SIZE, DELAY_MS, SORT_MODE, SNAPSHOT_DIR) which are reasonable for configuration. No SECRET/TOKEN/PASSWORD env vars are required or accessed.
Persistence & Privilege
always:false and the skill does not modify other skills or system-wide agent settings. It writes snapshot and report files only under its own skill directory (data/snapshots and reports), which is consistent with its purpose.
Assessment
This skill appears internally consistent, but review these practical points before installing: 1) Network: it will perform unauthenticated GETs to https://www.moltbook.com/api/v1 and needs outbound network access. If you policy-restrict network egress, run it in a sandbox or allow only that host. 2) Disk writes: scripts write JSON snapshots and markdown reports under the skill folder — ensure that location is acceptable and writable. 3) Source provenance: owner and homepage are unknown; if you do not trust the publisher, inspect the four scripts locally (they are small and readable) or run in an isolated environment first. 4) Rate/volume: default fetches can load multiple pages (PAGES, PAGE_SIZE) — test with smaller values to avoid hitting API limits. 5) No secrets are requested, and there is no evidence of exfiltration to other endpoints. If any of these assumptions change (e.g., modifications that add unknown network targets or credential usage), do not run the skill until re-reviewed.Like a lobster shell, security has layers — review code before you run it.
latestvk970a2n1ewtxawgtjyfjttrvyd83g28n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
Binsbash, curl, python3
