Code Docs Search by Exa
v1.0.0Search real code snippets and documentation from GitHub, docs sites, and Stack Overflow for accurate syntax and usage examples.
⭐ 1· 2k·0 current·0 all-time
byIshan Goswami@theishangoswami
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and SKILL.md describe searching code docs and returning code snippets; the instructions reference an Exa MCP endpoint and a single tool (get_code_context_exa). There are no unrelated env vars, binaries, or installs requested — this is proportionate to the described purpose.
Instruction Scope
Instructions are narrowly scoped to calling Exa's context API with a query and optional token limit. They do not request reading local files or other system state. Note: the skill directs queries to an external endpoint (https://mcp.exa.ai/mcp) — this is expected for a remote docs search but means query content will leave the agent environment.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or fetched during install. This is low-risk and coherent with the skill's behavior.
Credentials
The skill requires no environment variables, credentials, or config paths. That matches the SKILL.md claim of 'No API key needed.' There is an implicit requirement that the agent/platform provide the get_code_context_exa tool or integration.
Persistence & Privilege
always is false and there is no indication the skill will modify other skills or system-wide settings. The skill can be invoked autonomously by the agent (default behavior), which is normal for skills of this type.
Assessment
This skill appears to be a straightforward connector to Exa's code/docs API. Before installing, consider whether you will ever send proprietary or sensitive code in queries — those queries go to https://mcp.exa.ai/mcp and will be processed by Exa. Verify that the integration is an official Exa endpoint (confirm publisher/source) if you need assurance about data handling. Test with non-sensitive example queries first and consult your org's data-sharing policies if in doubt.Like a lobster shell, security has layers — review code before you run it.
latestvk97f268cb9b4z63kcjpfwtrpth7zzebv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
