Restaurant Crosscheck CN
Analysis
The skill’s restaurant-checking purpose is coherent, but it relies on saved logged-in Xiaohongshu/Dianping browser sessions and anti-scraping automation that are not declared in the registry metadata.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
- **Anti-scraping**: Use residential proxies, rotate user agents
The skill explicitly instructs evasive scraping techniques in addition to browser automation, which is higher-risk than ordinary API use and can affect user accounts or networks.
pip3 install playwright thefuzz python3 -m playwright install chromium
The documentation asks users to install packages and download a browser runtime, while the registry lists no install spec. This is expected for Playwright scraping but should be visible before installation.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
脚本自动保存登录状态 ... 登录状态会保存 1-2 周
This shows the skill saves and reuses authenticated platform login sessions; the registry metadata declares no primary credential or required config path, so users may not realize account sessions are part of the skill’s authority.
