@billyutw

Web Search

This skill should be used when users need to search the web for information, find current content, look up news articles, search for images, or find videos. It uses DuckDuckGo's search API to return results in clean, formatted output (text, markdown, or JSON). Use for research, fact-checking, finding recent information, or gathering web resources.

Current version
v1.0.0
28 2.6万All installs 478

v1.0.0

2026/01/29

Version

web-search 1.0.0 - Initial release of the skill. - Search the web using DuckDuckGo’s API for web pages, news, images, and videos. - Supports multiple result formats: plain text, markdown, and JSON. - Includes rich filtering (time range, region, safe search) and content-type options. - Image and video searches offer flexible filters (size, color, type, duration, resolution, layout). - Allows saving results to files for further use.

Security Scan

Status

clean

Open VirusTotal

OpenClaw

gpt-5-mini

clean

OpenClaw analysis

The skill's files and runtime instructions are consistent with a DuckDuckGo-based web search tool: it requires no credentials, uses a reasonable PyPI dependency, and does not request unexpected access — however the publisher is unknown so review dependencies and run in an isolated environment if you have concerns.

Confidence: high

VirusTotal

Type: OpenClaw Skill Name: web-search Version: 1.0.0 The skill provides web search functionality using the legitimate `duckduckgo-search` library. The `SKILL.md` documentation is clear and does not contain any prompt injection attempts or instructions for malicious behavior. The `scripts/search.py` code is well-structured and primarily interacts with the DuckDuckGo API. However, the script includes a `--output` argument that allows writing search results to an arbitrary file path specified by the user. While this is a documented and plausible feature for saving results, it represents a file write capability that, if misused by a compromised or maliciously prompted agent, could lead to writing data to sensitive system locations. This constitutes a risky capability without clear malicious intent, classifying it as suspicious.

Metadata

  • Owner: @billyutw
  • Created: 2026/01/29
  • Updated: 2026/04/14
  • Versions: 1
  • Comments: 1
  • Scan checked at: 2026/02/11

Runtime

No runtime requirements are exposed in the official public payload.