Stock Monitor

v0.1.0

全功能智能股票监控预警系统。支持成本百分比、均线金叉死叉、RSI超买超卖、成交量异动、跳空缺口、动态止盈等7大预警规则。符合中国投资者习惯(红涨绿跌)。

60· 13.8k·117 current·122 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (stock monitoring, 7 rules) match the code: monitor, analyser, daemon, and tests all implement price/volume/MA/RSI/gap/trailing-stop logic and fetch market data from EastMoney/Sina/APIs. However, SKILL.md/README reference files that are not present in the package (config.example.py, RULE_REVIEW_REPORT.md), which is an inconsistency: the runtime instructions assume a config file that isn't bundled.
Instruction Scope
SKILL.md limits actions to starting/stopping a local daemon and editing a config; the code likewise only performs network fetches to public finance endpoints and writes logs/state under $HOME/.stock_monitor. Nothing in SKILL.md instructs the agent to read system secrets. Minor scope concerns: SKILL.md and README tell the user to copy a config.example.py that is missing, and the test suite inserts a hardcoded path (/home/wesley/...) which indicates leftover developer-specific instructions.
Install Mechanism
No install spec (instruction-only) and no external binary install — the lowest-risk install style. Nonetheless the package contains executable Python scripts which will be run (daemon via control.sh). There are no downloaded archives or third-party installers in the manifest.
Credentials
The skill declares no required environment variables or credentials and the code does not appear to request secrets. It performs outbound HTTP requests to public finance APIs (eastmoney, sina) which is appropriate for the stated purpose. No unrelated credential names or config paths are requested.
Persistence & Privilege
always is false; the skill runs as an optional background daemon when started via control.sh. It creates logs and a PID file under the user's home directory (~/.stock_monitor) which is expected for a long-running monitor. This is normal but means it will persist on the host while running.
What to consider before installing
What to check before installing or running this skill: - Missing files: SKILL.md and README instruct you to copy/edit config.example.py and reference RULE_REVIEW_REPORT.md, but those files are not present. Don’t run the daemon until you locate or create the intended config (search the package or contact the author). Running without the expected config may produce runtime errors or unexpected defaults. - Network access: The scripts make outbound HTTP requests to third-party finance services (eastmoney, sina, push2.eastmoney). This is expected for a market-monitoring tool, but be aware that your machine will contact those external endpoints whenever the daemon runs. - Local persistence: The daemon writes logs and a PID file to $HOME/.stock_monitor and runs in the background via nohup; review and rotate logs as needed and avoid running as root. Inspect the log files before trusting behavior. - Hardcoded test path: test_suite.py inserts a hardcoded sys.path (/home/wesley/...), which is a developer leftover—this is not necessary for normal runtime but suggests the package may not be cleanly packaged. Run tests in a sandbox/virtualenv and inspect test code before executing. - Sensitive data: The skill does not request API keys, but you will be asked to edit a config with your holdings (costs). Ensure you do not accidentally paste personal secrets or API tokens into the config. If you add notification hooks (email/webhook/Telegram) to the config, audit those integrations. - Suggested precautions: run the scripts in a disposable environment (container or VM) first; open the scripts and search for unexpected remote endpoints or credential usage; supply a minimal config and run the test suite in isolation; restrict network access if you want to observe behavior before full deployment. If you want, I can: (1) list every external URL the code will contact, (2) point out the exact missing files and locations where the package assumes them, or (3) help create a minimal safe config to run tests in a sandbox.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cjn23vmmqf5x8r707bj67d581gphn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments