openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > Competitor Trial Monitor

Monitor competitor clinical trial progress and alert on market risks

开发与 DevOps

作者:AIpoch @AIPOCH-AI

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v0.1.0

统计:⭐ 0 · 37 · 0 current installs · 0 all-time installs

0

安装量(当前) 0

🛡 VirusTotal :良性 · OpenClaw :可疑

Package:aipoch-ai/competitor-trial-monitor

安全扫描(ClawHub)

  • VirusTotal :良性
  • OpenClaw :可疑

OpenClaw 评估

The skill's code largely matches its stated purpose (monitor ClinicalTrials.gov) but the documentation and metadata claim extra capabilities and dependencies (EU/WHO registries, Feishu alerts, requests/dateutil) that are not implemented — these inconsistencies merit caution before installing or running it.

目的

SKILL.md states multiple data sources (ClinicalTrials.gov, EU register, WHO ICTRP) and alert channels (e.g., Feishu) and lists dependencies (requests, python-dateutil). The included script, however, only queries ClinicalTrials.gov via urllib and writes local JSON alert files/prints to console. Declared features and dependencies do not match the code, which suggests documentation drift or incomplete/incorrect implementation.

说明范围

Runtime instructions map to the provided CLI and filesystem paths (~/.openclaw/competitor-trial-monitor). The script performs network calls to clinicaltrials.gov (expected) and reads/writes only to its own data directory. It does not read unrelated system files or request environment variables. However SKILL.md implies external alert delivery (Feishu) and other registries that the script does not implement; the agent instructions therefore ove…

安装机制

This is an instruction-only skill with no install spec. The only executable artefact is the included Python script; nothing is downloaded or installed automatically by the skill bundle.

证书

The skill requests no environment variables, credentials, or config paths beyond writing into a per-user directory under the user's home (~/.openclaw/...). No secrets are requested. This is proportionate to the stated purpose.

持久

always:false and the skill does not request system-wide changes or modify other skills. It stores state only under the user's home directory in a dedicated path.

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「Competitor Trial Monitor」。简介:Monitor competitor clinical trial progress and alert on market risks。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/aipoch-ai/competitor-trial-monitor/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

---
name: competitor-trial-monitor
description: Monitor competitor clinical trial progress and alert on market risks
version: 1.0.0
category: Pharma
tags: []
author: AIPOCH
license: MIT
status: Draft
risk_level: High
skill_type: Hybrid (Tool/Script + Network/API)
owner: AIPOCH
reviewer: ''
last_updated: '2026-02-06'
---

# Competitor Trial Monitor (ID: 178)

Monitor competitor clinical trial progress and alert on market risks.

## Features

- Monitor changes in clinical trial status for specified competitors
- Track key milestones: enrollment completion, data unblinding, final results publication
- Alert on potential market competition risks

## Data Sources

- **ClinicalTrials.gov** - US Clinical Trials Registry
- **EU Clinical Trials Register** - EU Clinical Trials Registry
- **WHO ICTRP** - International Clinical Trials Registry Platform

## Parameters

### Commands

| Command | Description | Parameters |
|---------|-------------|------------|
| `add` | Add trial to watchlist | `--nct` (required), `--company`, `--drug`, `--indication` |
| `list` | List all monitored trials | None |
| `remove` | Remove trial from watchlist | `--nct` (required) |
| `scan` | Scan for updates | None |
| `report` | Generate risk report | `--days` (default: 30) |

### Command Parameters

**add command:**
| Parameter | Type | Default | Required | Description |
|-----------|------|---------|----------|-------------|
| `--nct` | string | - | Yes | ClinicalTrials.gov NCT ID |
| `--company` | string | Unknown | No | Competitor company name |
| `--drug` | string | Unknown | No | Drug name |
| `--indication` | string | Unknown | No | Indication/disease |

**remove command:**
| Parameter | Type | Default | Required | Description |
|-----------|------|---------|----------|-------------|
| `--nct` | string | - | Yes | NCT ID to remove |

**report command:**
| Parameter | Type | Default | Required | Description |
|-----------|------|---------|----------|-------------|
| `--days` | int | 30 | No | Report time range in days |

## Usage

### Add Monitoring Target

```bash
python scripts/main.py add --nct NCT05108922 --company "Pfizer" --drug "PF-07321332" --indication "COVID-19"
```

### Scan for Updates

```bash
python scripts/main.py scan
```

### View Monitoring List

```bash
python scripts/main.py list
```

### Remove Monitoring Target

```bash
python scripts/main.py remove --nct NCT05108922
```

### Generate Risk Report

```bash
python scripts/main.py report --days 30
```

## Data Storage

Monitoring configuration and data stored in `~/.openclaw/competitor-trial-monitor/`:
- `watchlist.json` - Monitoring list
- `history/` - Historical snapshots
- `alerts/` - Alert records

## Alert Rules

| Event | Risk Level | Description |
|------|----------|------|
| Enrollment Completion | 🟡 Medium | Competitor enters next phase |
| Data Unblinding | 🔴 High | Results about to be announced |
| Results Publication | 🔴 High | Direct impact on market competition |
| Regulatory Submission | 🔴 High | Marketing application in progress |
| Approval Granted | 🔴 Critical | Direct competition begins |

## Dependencies

```bash
pip install requests python-dateutil
```

## Configuration File

`~/.openclaw/competitor-trial-monitor/config.json`:

```json
{
  "alert_channels": ["feishu"],
  "scan_interval_hours": 24,
  "risk_threshold": "medium"
}
```

## Risk Assessment

| Risk Indicator | Assessment | Level |
|----------------|------------|-------|
| Code Execution | Python scripts with tools | High |
| Network Access | External API calls | High |
| File System Access | Read/write data | Medium |
| Instruction Tampering | Standard prompt guidelines | Low |
| Data Exposure | Data handled securely | Medium |

## Security Checklist

- [ ] No hardcoded credentials or API keys
- [ ] No unauthorized file system access (../)
- [ ] Output does not expose sensitive information
- [ ] Prompt injection protections in place
- [ ] API requests use HTTPS only
- [ ] Input validated against allowed patterns
- [ ] API timeout and retry mechanisms implemented
- [ ] Output directory restricted to workspace
- [ ] Script execution in sandboxed environment
- [ ] Error messages sanitized (no internal paths exposed)
- [ ] Dependencies audited
- [ ] No exposure of internal service architecture
## Prerequisites

No additional Python packages required.

## Evaluation Criteria

### Success Metrics
- [ ] Successfully executes main functionality
- [ ] Output meets quality standards
- [ ] Handles edge cases gracefully
- [ ] Performance is acceptable

### Test Cases
1. **Basic Functionality**: Standard input → Expected output
2. **Edge Case**: Invalid input → Graceful error handling
3. **Performance**: Large dataset → Acceptable processing time

## Lifecycle Status

- **Current Stage**: Draft
- **Next Review Date**: 2026-03-06
- **Known Issues**: None
- **Planned Improvements**: 
  - Performance optimization
  - Additional feature support