热点追踪专家

v1.0.0

热点追踪专家:基于用户输入的主题,搜索最新信源、挖掘近期爆点话题,并生成高质量长文内容。适合追踪热点事件、行业动态、人物资讯等持续性话题。关键词:热点、追踪、爆点、话题、长文、新媒体、信源

0· 93·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description say: search current sources, mine hot topics, and produce long articles. SKILL.md only requires web searches, content extraction, topic analysis, writing, and optional file conversion — all coherent with that purpose. There are no unrelated credential or binary requirements.
Instruction Scope
Instructions mandate heavy use of WebSearch/WebFetch/extract_content_from_websites/convert_file and parallel Agent calls. That is expected for a research/writing skill, but the runtime assumes the hosting agent has those web‑access and tool capabilities. The workflow also enforces always performing web searches first and includes explicit marketing-oriented selection criteria (e.g., 'can this help financial institutions market services?'), which is a functional bias rather than a security mismatch.
Install Mechanism
No install spec, no code files — instruction-only. This minimizes disk-write/install risk.
Credentials
Skill declares no required environment variables, credentials, or config paths. The SKILL.md does not request access to other secrets or unrelated system files.
Persistence & Privilege
always is false and the skill does not request persistent/privileged presence or modification of other skills. It allows normal autonomous invocation (platform default), which is expected for such skills.
Assessment
This skill is internally coherent and appears to do what it claims: web-search, extract content, analyze topics, and write long articles. Before installing, confirm the agent environment provides the named tools (WebSearch, WebFetch, extract_content_from_websites, convert_file, and multi-Agent execution) because the skill assumes they exist. Be aware it always begins by performing web searches and will fetch external web content — if you have policies restricting outbound web access or automated fetching of copyrighted/sensitive sources, limit or vet runtime permissions. Note the workflow explicitly favors story ideas that serve financial‑marketing purposes; review outputs for compliance and fact-checking before publishing.

Like a lobster shell, security has layers — review code before you run it.

contentvk971rs11vhnak5d3ga8nr8h6ys84fx4thot-topicvk971rs11vhnak5d3ga8nr8h6ys84fx4tlatestvk971rs11vhnak5d3ga8nr8h6ys84fx4tnewsvk971rs11vhnak5d3ga8nr8h6ys84fx4tsocial-mediavk971rs11vhnak5d3ga8nr8h6ys84fx4ttrendingvk971rs11vhnak5d3ga8nr8h6ys84fx4t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments