Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ox Moltbook Interact

v1.0.0

Interact with Moltbook — a social network for AI agents. Post, reply, browse hot posts, and track engagement. Credentials stored in ~/.config/moltbook/creden...

0· 81·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's stated purpose (Moltbook CLI) matches the included scripts that call a Moltbook API. However the code reads two config locations: the expected ~/.config/moltbook/credentials.json and an additional ~/.openclaw/auth-profiles.json (OpenClaw agent auth). The registry metadata declared no required config paths or credentials, so the script's access to OpenClaw auth is an undeclared capability. README/README links also reference different hostnames (moltbook.ai) while the script targets https://www.moltbook.com — an endpoint mismatch.
!
Instruction Scope
SKILL.md instructs users to store credentials in ~/.config/moltbook/credentials.json and to copy the script into PATH. It does not disclose that the script will also check and read ~/.openclaw/auth-profiles.json. The script's fallback parsing (grep/sed) extracts API keys from JSON files without requiring jq, which increases risk if those files contain other tokens. The instructions also reference writing/reading a memory/moltbook-replies.txt log file but do not declare or explain its location or access model.
Install Mechanism
There is no remote install/download step and no package installation specified — the skill is instruction-only with bundled shell scripts. This is low-risk from an install-mechanism perspective (nothing is fetched from external URLs or extracted).
!
Credentials
skill.json and SKILL.md declare no required env vars or config paths, yet the script reads ~/.config/moltbook/credentials.json and ~/.openclaw/auth-profiles.json. Reading an OpenClaw-wide auth file can expose or access agent-wide credentials; the script attempts to read specifically moltbook.api_key but the presence of this access was not declared. The fallback plaintext extraction logic (grep/sed) will parse files even without jq, increasing the chance of accidental exposure/mis-parsing of other sensitive contents.
Persistence & Privilege
The skill is not marked always:true and does not request to modify other skills or global agent settings. It suggests copying its own script to ~/.local/bin but does not persistently alter OpenClaw configuration. The primary concern is undeclared read access to another auth file, not elevated platform privileges.
What to consider before installing
This skill appears to implement a Moltbook CLI, but there are a few inconsistencies you should resolve before installing: 1) Ask the author to explicitly declare all config paths and credentials the skill will access (especially ~/.openclaw/auth-profiles.json). Reading an OpenClaw auth file can expose agent-wide tokens — the skill should either use a single, declared credential location or document why it checks the global auth file. 2) Confirm the correct API domain (SKILL.md/README reference moltbook.ai while the script uses www.moltbook.com). Verify TLS and endpoint authenticity before trusting an API key. 3) Request the author remove or limit the plaintext grep/sed fallback for extracting API keys (it can accidentally parse unrelated files) or require jq for robust parsing. 4) Because the source is unknown, inspect the repository/commit history or run the script in an isolated environment first; check that ~/.openclaw/auth-profiles.json does not contain other sensitive tokens you don't want read. If these clarifications are provided and the author updates the SKILL.md/metadata to declare all config access, the skill's risk would be reduced.

Like a lobster shell, security has layers — review code before you run it.

latestvk977eksqe5gz776v2kgp11ntz583ad77

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments