openclaw-docs-online

v1.0.0

OpenClaw 官方文档查询技能 - 指导如何访问和查询 https://docs.openclaw.ai/ 官方文档

0· 154·0 current·0 all-time
bySlava Chan@uynewnas
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description say it's a documentation lookup helper for https://docs.openclaw.ai/ and the SKILL.md/CLAUDE.md only instruct the agent to find and cite official documentation. There are no unrelated env vars, binaries, or install steps required — the requested capabilities are proportionate to a docs lookup skill.
Instruction Scope
The runtime instructions focus on web-based document lookup, structured extraction, and citing sources — all within scope. The examples include local commands and paths (e.g., ~/.openclaw/gateway, openclaw restart, viewing logs), which are plausible examples for troubleshooting but could be misinterpreted by an agent with shell access as actions to execute. The instructions do not explicitly tell the agent to read arbitrary system files or exfiltrate data.
Install Mechanism
No install spec or code is provided (instruction-only). Nothing is downloaded or written to disk by the skill itself, so install-risk is minimal.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. It does note that network access is required to reach the official docs, which is expected for its purpose.
Persistence & Privilege
Flags show always:false and normal model invocation allowed. The skill does not request permanent presence nor modify other skills or system-wide settings. Autonomous invocation is the platform default and is not a problem here by itself.
Assessment
This skill appears coherent and matches its description: it helps the agent look up and cite https://docs.openclaw.ai/. Before installing, confirm whether you want the agent to have network access to fetch docs. Also review your agent's runtime privileges: if the agent is allowed to run shell commands or access local files, be aware the skill's examples reference local paths and restart commands (e.g., ~/.openclaw/gateway, openclaw restart); consider restricting shell/file access or requiring explicit user confirmation before the agent executes any local commands. If future versions add installs, external download URLs, or requests for API keys/credentials, re-evaluate (those would raise concerns).

Like a lobster shell, security has layers — review code before you run it.

latestvk970cqddhat27hn4fbm9bp0sgd83hdk1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments