Price Alert Monitor
Analysis
This is a simple user-invoked price-monitoring script with no artifact-backed malicious behavior, but it stores shopping data locally and its notification documentation appears stronger than the included code supports.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
支持: - 打印到终端 - 发送邮件(需要配置 SMTP) - 发送到 Webhook export PRICE_WEBHOOK="your-webhook-url"
The documentation advertises SMTP/Webhook notification support, but the included script only prints target-hit messages and contains no SMTP or PRICE_WEBHOOK handling. This is a functionality/trust note, not evidence of hidden outbound transmission.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
DATA_FILE = os.path.expanduser("~/.price-monitor.json") ... "url": url ... "target_price": args.target or 0The script persistently stores monitored product URLs and target prices in a home-directory JSON file.
