SEC Watcher

v1.0.0

Monitor SEC EDGAR filings for AI/tech companies in real time. Use this skill when the user asks about SEC filings, EDGAR data, company disclosures, 8-K event...

0· 768·3 current·3 all-time
byProbabilistic Paladin@sukanto-m
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (SEC EDGAR filing monitor) align with the shipped files and declared requirements. The included Python fetcher implements queries against the SEC full-text search endpoint and a curated watchlist; requiring python3 is appropriate.
Instruction Scope
SKILL.md instructs running scripts/fetch-filings.py with explicit flags and describes expected output; it does not ask the agent to read unrelated files, environment variables, or send data to unexpected endpoints. The 'Pro' promotional text references a website but is not invoked by the code.
Install Mechanism
No install spec (instruction-only) and code is included as plain Python files. There is no download-from-arbitrary-URL, no package installation, and nothing will be auto-downloaded during install.
Credentials
The skill declares no required environment variables or credentials and the code does not read secrets or config paths. Network access is used only to call the public SEC EFTS endpoint.
Persistence & Privilege
Skill is not configured always:true and does not modify system-wide agent settings or other skills. It runs as an on-demand/local script and has normal, limited presence.
Assessment
This skill appears internally consistent: it runs a local Python script that queries the public SEC EFTS API and formats results. Before installing, consider: (1) network calls reveal which companies you query (the SEC will see requests from the host IP); (2) the SKILL.md references a commercial product (signal-report.com) but the code does not call that site — verify you trust the skill source since the registry owner is an opaque ID; (3) if you plan to run in a sensitive environment, review the included scripts yourself (they are short and readable) and run the provided tests (scripts/test_skill.py) in a sandbox; (4) the script sets a custom User-Agent string — harmless but be aware it identifies this tool. If you want extra assurance, run the fetcher against a non-production network or inspect network traffic to confirm it only contacts efts.sec.gov.

Like a lobster shell, security has layers — review code before you run it.

latestvk976xmrw38kjjdnc3n7h5j20ms81g9f7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📊 Clawdis
OSmacOS · Linux · Windows
Binspython3

Comments