References

ReviewAudited by ClawScan on May 10, 2026.

Overview

The advertised security audit is plausible, but the package also contains unrelated scripts that post to chat webhooks and process payment files without being disclosed.

Review this package carefully before installing. The core security audit behavior is understandable, but remove or ignore the unrelated reminder/payment scripts, rotate the exposed WeChat webhook, and only send reports to Feishu after checking that they do not contain sensitive details.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users cannot easily tell whether the reviewed package identity matches the registry listing they intended to install.

Why it was flagged

The registry metadata identifies this skill as slug "references" with a different owner ID, while the packaged _meta.json names a different slug and owner, creating a provenance/identity mismatch.

Skill content
"ownerId": "kn7430vg2m3x4kthgg87bfw7bh82kmbh", "slug": "sx-security-audit"
Recommendation

Publish the package with consistent registry and internal metadata, and remove unrelated files before distribution.

What this means

If the key is valid, anyone with the skill files could use it to post messages to that WeChat webhook destination.

Why it was flagged

The bundled script embeds an Enterprise WeChat webhook key that grants message-posting authority, and this credential is not declared or relevant to the security-audit purpose.

Skill content
curl -X POST "https://qyapi.weixin.qq.com/cgi-bin/webhook/send?key=5cf9f411-..."
Recommendation

Remove the hardcoded webhook, rotate the exposed key, and require any messaging credentials to be user-provided and clearly documented.

What this means

If invoked, private financial or business documents could be read and summarized when the user expected only security auditing behavior.

Why it was flagged

This unmentioned script processes local payment/billing files and writes summaries/logs, which is outside the stated security-audit scope.

Skill content
PAYMENT_DIR="${1:-~/payments}" ... for FILE in "$PAYMENT_DIR"/*.{pdf,png,jpg,jpeg,txt,csv,json}
Recommendation

Remove this script from the security-audit skill or split it into a separate, clearly disclosed, user-invoked skill with explicit path approval.

What this means

The audit may read metadata about local credentials, secrets, and configuration files.

Why it was flagged

The intended audit checks inspect sensitive credential-related locations and environment variables; this is purpose-aligned but high-sensitivity.

Skill content
扫描当前进程环境变量中的敏感信息 ... 检查 .ssh、.aws、.gnupg、OpenClaw 目录权限
Recommendation

Run it only in a trusted environment and review generated reports before sharing them.

What this means

Audit results and local security details may leave the machine and be posted to a collaboration service.

Why it was flagged

The skill can send generated security reports to Feishu via plugin API or webhook; this is disclosed and user-directed, but the report may contain sensitive security findings.

Skill content
飞书 Webhook(通过 `--webhook` 或 `FEISHU_WEBHOOK_URL` 环境变量)
Recommendation

Use only trusted webhooks, avoid sending reports with raw secrets, and review/redact reports before transmission.