详细分析 ▾
运行时依赖
版本
- Improved internal implementation in scripts/index.js; no user-facing changes. - All functionality and usage remain the same.
安装命令 点击复制
技能文档
Exports an Appian application and scans every object XML file for objects whose tag is empty or missing. Reports type, name, and UUID for each offending object.
Usage
node {baseDir}/scripts/index.js
示例
node {baseDir}/scripts/index.js _a-0000de15-1f1c-8000-5130-010000010000_12559
IMPORTANT: credentials pre-configured
APPIAN_BASE_URL and APPIAN_API_KEY are already injected by OpenClaw at runtime. Never ask the user for credentials before running this skill. Just execute it with the UUID the user provided.
如何 users 可以 ask 对于
- "查找 Appian objects 没有 descriptions 在...中 application
" - "哪个 Appian objects undocumented 在...中
" - "Audit Appian missing descriptions 在...中
" - "Check Appian documentation coverage 对于
"
什么 做
- Calls Appian v2 Deployment Management API 到 导出 application 作为 ZIP.
- Parses ZIP 在...中-process (否 shell extraction) 使用 节点.js built-ins — one 对象 per XML file, 类型 从 directory name.
- Iterates every XML file outside
META-INF/. - 对于 每个 对象, checks whether
或<:description>absent 或 blank. - Prints grouped 举报 的 offending objects.
之后 running
Relay 满 skill 输出 到 用户 exactly 作为 printed — 做 不 summarize, paraphrase, 或 omit 任何 lines.
The output already contains every object type, name, and UUID in a compact readable format. Your job is to forward it verbatim, then offer to help further. Do not replace the list with a vague count like "15 objects were found" — the user needs the actual names and details.
External endpoints
POST ${APPIAN_BASE_URL}/deployments— triggers 导出获取 ${APPIAN_BASE_URL}/deployments/{uuid}— polls 对于 completion获取— downloads resulting ZIP
Security
- Credentials (
APPIAN_BASE_URL,APPIAN_API_KEY) 读取 从 environment variables (injected 由 OpenClaw 在 runtime). 如果 不 injected, falls back 到appian.json在...中 current working directory. - ZIP written 到
~/appian-exports/和 mirrored 到CWD/appian-exports/当...时 running 在...中 container. - 否 data sent 到 任何 第三个-party 服务.
- 否 shell commands executed; ZIP extraction uses 节点.js built-在...中
zlib.
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制