B2A Agent-Discoverability Audit
v1.0.0Audits e-commerce sites for AI shopping agent discoverability, scoring product data, APIs, feeds, checkout compatibility, and description quality with priori...
⭐ 0· 42·1 current·1 all-time
byZero2Ai@zero2ai-hub
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (audit e-commerce sites for AI shopping agent discoverability) match the instructions: inspecting product pages, JSON-LD, public product APIs, feeds, and checkout API endpoints — all directly relevant to the stated goal.
Instruction Scope
Instructions are scoped to public storefront endpoints and content inspection. One notable operational action is testing POST /wp-json/wc/store/v1/cart/add-item which may create carts or server-side state; this is relevant to checkout-compatibility testing but can have side effects and should be rate-limited and run with permission or against staging when possible.
Install Mechanism
Instruction-only skill with no install spec or code to write to disk—lowest installation risk.
Credentials
No environment variables, credentials, or config paths are requested. That aligns with the public-read nature of the checks described.
Persistence & Privilege
Skill is not forced-always, does not request persistent system modification, and does not attempt to modify other skills or global agent settings.
Assessment
This skill appears coherent for auditing public storefront discoverability. Before running: obtain the site owner's permission (to avoid unwanted traffic or side effects), prefer staging/test stores for POST-based checkout tests, rate-limit requests to avoid load, avoid creating real orders or modifying inventory, and ensure any appended reports are stored where you expect and do not leak private data. If you need the skill to test authenticated admin-only feeds, expect it to require credentials (none are requested now) — do not provide secrets unless you trust the source.Like a lobster shell, security has layers — review code before you run it.
latestvk9782qj34tk36c4gyxj0xga9v583x8sf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
