arXiv Explorer

v1.0.1

Search, download, and explore arXiv academic papers. Use when the user needs to find research papers, download PDFs, get recent publications in a field, or s...

0· 73·0 current·0 all-time
by千年虫@xunuowu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The SKILL.md description (search, download, recent papers) aligns with the included CLI Python script: it queries the arXiv API, parses results, formats output, and downloads PDFs. There are no unrelated credentials, binaries, or configuration requests.
Instruction Scope
SKILL.md and the script stay within the stated scope (searching and downloading). One minor mismatch: the README mentions 'summarize academic content' but the script only extracts the abstract from the Atom feed and truncates it (no model-based summarization). The script uses the arXiv API endpoint and direct PDF downloads only; it does not read local files or environment variables.
Install Mechanism
There is no install spec; this is an instruction-only skill with a bundled Python script. No downloads from third-party URLs or installers are performed by the skill itself, so the install surface is minimal.
Credentials
The skill requires no environment variables, credentials, or configuration paths. Network access is limited to arXiv (export.arxiv.org and arxiv.org) and the SKILL.md references an external QR image hosted on raw.githubusercontent.com for donations — this is informational only and not used by the script.
Persistence & Privilege
The skill does not request always:true or any elevated/persistent privileges. It does not modify other skills or system-wide agent settings.
Assessment
This skill appears coherent and low-risk: it only queries arXiv and downloads PDFs and asks for no secrets. Before installing or running, consider these points: (1) The script uses http://export.arxiv.org for the Atom API — upgrading to HTTPS (if supported) would reduce MITM risk; (2) XML is parsed with regex (fragile but not malicious); (3) PDF downloads write to the current directory (no credential exfiltration). If you want extra caution, inspect the included scripts/arxiv-explorer.py yourself and run it in a sandbox or virtual environment. If you expect advanced summarization beyond the abstract, be aware the tool does not perform model-based summarization.

Like a lobster shell, security has layers — review code before you run it.

academicvk978cg725f26xxavwjhnaej7mn83njfparxivvk978cg725f26xxavwjhnaej7mn83njfplatestvk978cg725f26xxavwjhnaej7mn83njfppapersvk978cg725f26xxavwjhnaej7mn83njfpresearchvk978cg725f26xxavwjhnaej7mn83njfpsciencevk978cg725f26xxavwjhnaej7mn83njfp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments