Toolverse
All skills

idealista

by openclaw

Query Idealista API via idealista-cli (OAuth2 client credentials).

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Author
openclaw
Category
Security

About this skill

Query Idealista API via idealista-cli (OAuth2 client credentials).

How to use

  1. Zainstaluj idealista-cli, klonując repozytorium: git clone https://github.com/quifago/idealista-cli do katalogu domowego. Upewnij się, że masz zainstalowany Python 3.

  2. Skonfiguruj poświadczenia OAuth2. Ustaw zmienne środowiskowe IDEALISTA_API_KEY (client_id) i IDEALISTA_API_SECRET (client_secret) w terminalu, lub zapisz je trwale za pomocą polecenia: python3 -m idealista_cli config set --api-key "TWOJ_CLIENT_ID" --api-secret "TWOJ_CLIENT_SECRET". Konfiguracja zostanie zapisana w ~/.config/idealista-cli/config.json.

  3. Uzyskaj token dostępu, uruchamiając: python3 -m idealista_cli token. Token zostanie automatycznie buforowany. Jeśli token wygaśnie, odśwież go poleceniem python3 -m idealista_cli token --refresh.

  4. Wyszukuj nieruchomości, podając współrzędne geograficzne i parametry. Przykład: python3 -m idealista_cli search --center "39.594,-0.458" --distance 5000 --operation sale --property-type homes --all-pages --format summary. Zmień współrzędne, zasięg, typ operacji (sale/rent) i typ nieruchomości (homes/offices/garages) zgodnie z zapytaniem.

  5. Aby uzyskać statystyki cenowe, użyj polecenia avg zamiast search: python3 -m idealista_cli avg --center "39.594,-0.458" --distance 5000 --operation sale --property-type homes --group-by propertyType. Wynik pokaże średnie ceny pogrupowane wybranym kryterium.

  6. Integruj te polecenia z agentem AI, przekazując naturalne pytania użytkownika (np. "Znajdź mieszkanie w A Coruña poniżej 200 000 euro") do odpowiednich parametrów CLI.

Related skills

architect-review

by sickn33

Master software architect specializing in modern architecture patterns, clean architecture, microservices, event-driven systems, and DDD. Reviews system designs and code changes for architectural integrity, scalability, and maintainability. Use PROACTIVELY for architectural

Security
2773

google-analytics

by davila7

Analyze Google Analytics data, review website performance metrics, identify traffic patterns, and suggest data-driven improvements. Use when the user asks about analytics, website metrics, traffic analysis, conversion rates, user behavior, or performance optimization.

Security
1260

backend-security-coder

by sickn33

Expert in secure backend coding practices specializing in input validation, authentication, and API security. Use PROACTIVELY for backend security implementations or security code reviews.

Security
1133

payload

by payloadcms

Use when working with Payload CMS projects (payload.config.ts, collections, fields, hooks, access control, Payload API). Use when debugging validation errors, security issues, relationship queries, transactions, or hook behavior.

Security
50171

security-compliance

by davila7

Guides security professionals in implementing defense-in-depth security architectures, achieving compliance with industry frameworks (SOC2, ISO27001, GDPR, HIPAA), conducting threat modeling and risk assessments, managing security operations and incident response, and embedding

Security
1172

academic-researcher

by Shubhamsaboo

Academic research assistant for literature reviews, paper analysis, and scholarly writing.\nUse when: reviewing academic papers, conducting literature reviews, writing research summaries,\nanalyzing methodologies, formatting citations, or when user mentions academic research,

Security
1260