Add Siliconflow Provider 1

v1.0.0

为 OpenClaw 配置硅基流动 (SiliconFlow) 作为模型源。SiliconFlow 是国内领先的 AI 模型推理平台,提供 98+ 个 chat 模型,包含多个免费模型(Qwen3-8B、DeepSeek-R1-8B 等)。使用标准 OpenAI 协议(openai-completions)。包含 provider 注册、模型定义、别名配置、fallback 链接入和验证的完整流程。当管理员说想"加硅基流动"、"配 SiliconFlow"、"接入 SF 模型"、"加 Kimi"、"加 Qwen3"、"加免费模型"、"接入 DeepSeek V3.2"时使用此 skill。

3· 798·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name/description match its contents: a step-by-step guide to register a SiliconFlow provider, define models, add aliases, and validate an API key. Required binaries/env/configs declared are none, which fits an instruction-only guide. No unrelated services or credentials are requested.
Instruction Scope
Instructions explicitly tell the operator to back up and edit the OpenClaw config (~/.openclaw/openclaw.json), run a curl against SiliconFlow's API for key validation, and apply a gateway config.patch to add providers/models/aliases. All actions are within the scope of configuring a model provider, but the skill tells the admin to store the provider API key directly in the OpenClaw config — this is expected for provider registration but has security implications (see guidance).
Install Mechanism
No install spec or code files are included; the skill is purely documentation/instructions. This is the lowest-risk install posture.
Credentials
The skill declares no required environment variables or credentials, and does not attempt to access unrelated secrets. However, it instructs administrators to place a SiliconFlow API key (format sk-xxx) into OpenClaw's config JSON. Storing an API key in a plaintext config file may expose it to others with access to the host — this is proportional to the task but worth protecting.
Persistence & Privilege
The skill is not always-enabled and does not request autonomous privileges. It instructs modifying the OpenClaw configuration (provider/models/aliases), which is a normal administrative operation for this purpose and requires admin rights on the host — no elevated or unexpected platform-wide privileges are requested by the skill itself.
Assessment
This skill is a coherent how-to for adding SiliconFlow to OpenClaw. Before applying: 1) Verify you trust the SiliconFlow endpoints and the invite link; cross-check with official docs (links are provided in README/SKILL.md). 2) Backup and inspect the config backup before and after applying the patch (the SKILL.md shows a cp backup step). 3) Treat the SiliconFlow API key as a secret: avoid committing it to shared repos or exposing it in logs; if your deployment supports a secrets store or environment variable for provider credentials, prefer that over plaintext config. 4) Confirm the gateway config.patch operation is executed by an administrator and review the resulting ~/.openclaw/openclaw.json to ensure only the intended entries were added. 5) Note the skill source/homepage is unknown — if you need higher assurance, obtain the same steps directly from OpenClaw or SiliconFlow official docs rather than third-party instructions.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a9cr9va0aec70qxdtv1ks6n811d4g

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments