详细分析 ▾
运行时依赖
版本
- Updated scripts/index.js (details not specified). - Version bump to 1.6.0.
安装命令 点击复制
技能文档
Exports an Appian application and scans every object's (SAIL markup) for references to outdated versioned functions. Appian marks deprecated functions by appending _v to the function name in quoted rule references — e.g. #"SYSTEM_SYSRULES_DOSOMETHING_v1". Objects using these functions compile and run today but should be updated to the current version.
Usage
node {baseDir}/scripts/index.js
示例
node {baseDir}/scripts/index.js _a-0000de15-1f1c-8000-5130-010000010000_12559
IMPORTANT: credentials pre-configured
APPIAN_BASE_URL and APPIAN_API_KEY are already injected by OpenClaw at runtime. Never ask the user for credentials before running this skill. Just execute it with the UUID the user provided.
如何 users 可以 ask 对于
- "查找 Appian tech debt 在...中 application
" - "Check Appian 对于 outdated functions 在...中
" - "哪个 Appian objects 使用 deprecated SAIL 在...中
" - "Audit Appian app
对于 tech debt"
什么 做
- Calls Appian v2 Deployment Management API 到 导出 application 作为 ZIP.
- Parses ZIP 在...中-process 使用 节点.js built-ins — one 对象 per XML file, 类型 从 directory name.
- Iterates every XML file outside
META-INF/. - Searches 每个 file's content 对于 pattern
#"..._v<数字>"(Appian's marker 对于 outdated versioned 函数 references). - Prints per-对象 findings 带有 developer-friendly
!functionNamedisplay names 和 deduplicated summary.
之后 running
Relay 满 skill 输出 到 用户 exactly 作为 printed — 做 不 summarize, paraphrase, 或 omit 任何 lines.
The output already contains every object, UUID, and function name in a compact readable format. Your job is to forward it verbatim, then offer to help further. Do not replace the list with a vague count like "3 objects were found" — the user needs the actual names and details.
External endpoints
POST ${APPIAN_BASE_URL}/deployments— triggers 导出获取 ${APPIAN_BASE_URL}/deployments/{uuid}— polls 对于 completion获取— downloads resulting ZIP
Security
- Credentials (
APPIAN_BASE_URL,APPIAN_API_KEY) 读取 从 environment variables (injected 由 OpenClaw 在 runtime). 如果 不 injected, falls back 到appian.json在...中 current working directory. - ZIP written 到
~/appian-exports/和 mirrored 到CWD/appian-exports/当...时 running 在...中 container. - 否 data sent 到 任何 第三个-party 服务.
- 否 shell commands executed; ZIP extraction uses 节点.js built-在...中
zlib.
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制