Volcengine Documentation
v1.0.0火山引擎官方文档查询工具,支持文档检索和全文获取。涵盖火山引擎全部产品、开发者工具、服务支持、最佳实践,包括产品介绍、使用、计费、部署、故障排查、API、SDK、服务条款/协议等全流程。任何涉及火山引擎产品咨询、使用问题、文档查询的需求都优先调用本技能。
⭐ 0· 63·0 current·0 all-time
bysdk-team@volc-sdk-team
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description describe a documentation search and fetch tool and the included script plus SKILL.md implement exactly that (search and fetch via a docs API). The requests go to a docs API and results are returned and post-processed as described.
Instruction Scope
SKILL.md restricts runtime behavior to calling the specified search/fetch endpoints and returning results with CleanUrl links. It does not instruct reading local files, environment variables, or sending data to unrelated endpoints.
Install Mechanism
No install spec (lowest risk). However, the shipped Python script requires a Python runtime and the 'requests' package; these dependencies are not declared in the metadata. This is an operational omission (may cause runtime errors) but not a malicious install pattern.
Credentials
The skill requests no environment variables, credentials, or config paths — proportional to a public documentation lookup tool.
Persistence & Privilege
always:false and no special persistence requested. The skill can be invoked autonomously (platform default), which is expected for a tool — not excessive on its own.
Assessment
This skill appears to do what it claims: call a Volcengine docs API to search and fetch documents. Before installing, verify two small operational points: (1) the Python 'requests' dependency is available in your agent environment (or add it), and (2) confirm the API host (docs-api.cn-beijing.volces.com) is an expected/official Volcengine endpoint for your organization — if you need absolute assurance, contact Volcengine or inspect network logs/DNS to confirm the domain. No credentials are requested and the script does not access local files, but if you must run untrusted code in a sensitive environment, consider running it in a sandbox or reviewing the code yourself first.Like a lobster shell, security has layers — review code before you run it.
latestvk971qrzzks5zpcks4xm499ksqs84dek3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
