EdgeIQ Competitor Price Intelligence

v1.0.0

Monitor public competitor product pages and ecommerce listings for price, availability, and listing changes. Use when tracking retailer or marketplace produc...

0· 20·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for snipercat69/edgeiq-competitor-price-intelligence.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "EdgeIQ Competitor Price Intelligence" (snipercat69/edgeiq-competitor-price-intelligence) from ClawHub.
Skill page: https://clawhub.ai/snipercat69/edgeiq-competitor-price-intelligence
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install snipercat69/edgeiq-competitor-price-intelligence

ClawHub CLI

Package manager switcher

npx clawhub@latest install edgeiq-competitor-price-intelligence
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included files: the Python script implements public-page fetching, extraction, snapshot state, reporting, and optional Telegram/Twilio alerts as described. No unrelated cloud credentials or system-level accesses are requested.
Instruction Scope
SKILL.md and README constrain behavior to public or explicitly authorized pages, recommend one-shot runs, and document state and watchlist file usage. The runtime instructions and the script focus on fetching target URLs, parsing content, storing local state, producing reports, and optionally sending alerts — all within the stated purpose.
Install Mechanism
No install spec is present (instruction-only plus a single Python script). The code uses only stdlib modules (urllib, html.parser, re, json, etc.), so there are no third-party installs or remote downloads in the bundle.
Credentials
The package declares no required env vars but includes logic to load an env file and will use environment variables for optional Telegram Bot API and Twilio-style WhatsApp credentials if configured. This is proportional to the optional alerting feature, but users should only provide messaging credentials they intend to use and avoid placing unrelated secrets in the .env file.
Persistence & Privilege
always:false and there is no code that modifies other skills or system-wide agent settings. The script persists snapshots to a user-specified local JSON state file, which is appropriate for its purpose.
Assessment
This skill appears to do what it says: monitor public product pages, keep local snapshots, and optionally send Telegram/WhatsApp alerts when you configure credentials. Before installing: (1) review and populate only the expected keys in .env (Telegram/Twilio tokens) and avoid putting unrelated secrets there; (2) ensure you have authorization to monitor the target pages and comply with site terms and rate limits; (3) run in a controlled environment and use the --dry-run/--no-alerts options when testing to avoid accidental outbound messages; (4) inspect any state-file and output paths used so the tool doesn't overwrite important files; and (5) if you need higher assurance, review the alerting functions (they are referenced but not shown in the truncated listing) to confirm alert delivery endpoints and payloads match expectations.

Like a lobster shell, security has layers — review code before you run it.

latestvk977yv5gnexe7s1mx9czejgm6s85cnxd
20downloads
0stars
1versions
Updated 4h ago
v1.0.0
MIT-0

EdgeIQ Competitor Price Intelligence

Version: 1.0.0

Category: Market Intelligence / Ecommerce Monitoring

Build a lightweight pricing-monitoring workflow for public or authorized product pages.

Tiers

  • Free
    • 1 watch target
    • Console/text output only
  • Pro — $19/mo
    • Multiple watch targets
    • Telegram alerts
    • WhatsApp alerts
    • JSON reports
    • HTML reports
  • Bundle — $39/mo
    • Everything in Pro
    • Bundle positioning for broader EdgeIQ Labs monitoring offerings

Features

  • Accept one or more product URLs directly
  • Accept watchlists from JSON, JSONL, CSV, TSV, or plain text
  • Fetch public product pages with stdlib HTTP tooling
  • Extract title, price, currency, and availability using layered fallback logic
  • Detect price changes, availability changes, and major title/listing changes
  • Store previous snapshots in a local JSON state file
  • Generate readable text, JSON, and HTML reports
  • Run safely in one-shot cron-style mode
  • Send concise change alerts through Telegram Bot API and Twilio-style WhatsApp when configured

Files

  • Main app: scripts/price_monitor.py
  • Environment template: .env.example
  • User guide and watchlist examples: README.md

Usage examples

Run against a single URL:

python3 scripts/price_monitor.py "https://example.com/product/sku-123"

Run against a watchlist and save reports:

python3 scripts/price_monitor.py \
  --watchlist ./watchlists/sample-watchlist.json \
  --state-file ./state/price-monitor-state.json \
  --json-out ./out/latest.json \
  --html-out ./out/latest.html \
  --text-out ./out/latest.txt

Run a dry test without updating state or sending alerts:

python3 scripts/price_monitor.py \
  --watchlist ./watchlists/sample-watchlist.json \
  --dry-run --no-alerts

Operating guidance

  • Use only public pages or pages the customer is explicitly authorized to monitor.
  • Do not attempt to bypass logins, CAPTCHAs, or anti-bot protections.
  • Prefer scheduled one-shot runs over aggressive polling.
  • Review extraction quality on each new retailer before relying on automated alerts.

Legal notice

Use this skill only for lawful market-intelligence monitoring of public webpages or sources you are authorized to access. Do not use it to evade access controls, scrape private data, bypass authentication, defeat anti-bot systems, or violate marketplace/site terms. The operator is responsible for confirming authorization, compliance obligations, and acceptable monitoring frequency.

Comments

Loading comments...