Openclaw Doc Helper

v1.0.3

Answer OpenClaw-related questions by querying and analyzing the official documentation at docs.openclaw.ai. TRIGGER CONDITIONS - Use this skill when: 1. User...

0· 111·0 current·0 all-time
byDaXuan@wx528
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description say it will answer OpenClaw questions by querying the official docs and the SKILL.md only asks to use web_fetch/web_search against docs.openclaw.ai and related URLs — these requirements match the stated purpose.
Instruction Scope
Runtime instructions are narrowly scoped to searching and fetching documentation and producing answers; the skill explicitly states it will not execute local commands and does not instruct reading local files, unrelated env vars, or exfiltrating data.
Install Mechanism
There is no install spec and no code files (instruction-only), so nothing will be written to disk or downloaded during install; this is the lowest-risk pattern.
Credentials
The skill requests no environment variables, credentials, or config paths. The declared needs (web access to docs.openclaw.ai) are proportional to answering documentation questions.
Persistence & Privilege
always is false and the skill is user-invocable with normal autonomous invocation allowed; it does not request permanent presence or attempt to modify other skills or system settings.
Assessment
This skill appears coherent and low-risk: it only instructs the agent to fetch official OpenClaw docs and summarize them. Before installing, confirm you are comfortable with the agent making outbound web requests (the skill uses web_fetch/web_search) and that your deployment allows fetching docs.openclaw.ai. Note the skill's source and homepage are not provided — if you require provenance, ask the publisher for a homepage or repo link. Finally, remember the skill will not run local commands for you; any configuration changes must be executed by you on your systems.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f8axv2bv09emv8qjjgzszc9846a1h

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments