Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cym Zentao

v1.0.2

禅道项目管理 CLI 工具 - 支持任务创建、执行查询等功能

0· 130·1 current·1 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for 15334615152/cym-zentao.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Cym Zentao" (15334615152/cym-zentao) from ClawHub.
Skill page: https://clawhub.ai/15334615152/cym-zentao
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required binaries: node
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install cym-zentao

ClawHub CLI

Package manager switcher

npx clawhub@latest install cym-zentao
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The code implements ZenTao API operations (login, list executions, create tasks, etc.) which matches the skill's stated purpose. However the skill does not declare required credentials or config paths even though both index.js and cli.js require a local file (~/.openclaw/workspace/TOOLS.md) containing API address, username, and password. That credential-source design is not documented in SKILL.md or registry metadata, an incoherence a user should be aware of.
!
Instruction Scope
SKILL.md describes CLI commands and natural-language behaviors but does not disclose that the runtime will read the user's HOME (USERPROFILE/HOME) .openclaw/workspace/TOOLS.md to extract ZenTao API URL, username, and password. The code will fail or throw if that file/section is missing, and the behavior (reading a specific local config file for secrets) is not documented in the instructions.
Install Mechanism
There is no install spec (instruction-only install), so nothing is downloaded at runtime. Code files are bundled with the skill and require node to run; this is expected for a Node.js CLI. No remote installation URLs or archive extraction are present.
!
Credentials
The registry lists no required environment variables or credentials, but the implementation expects credentials to be stored in a local file under the user's home directory. This mismatch means secrets are accessed indirectly from a specific path instead of via declared env vars, and the skill does not advertise that it needs or will use those credentials. The only env usage is for locating HOME/USERPROFILE; no other unrelated credentials are requested.
!
Persistence & Privilege
The skill is marked always: true (also in SKILL.md metadata). That means it will be included in every agent run. Combined with the hidden behavior of reading a user-local file for credentials, this raises concern about broad exposure of local credential data to an always-enabled skill. There is no documented justification for always: true in the metadata.
What to consider before installing
This skill appears to implement a legitimate ZenTao CLI, but it quietly reads credentials from ~/.openclaw/workspace/TOOLS.md (parsing an "## 禅道 API (ZenTao API)" section for API URL, username, and password) even though the package metadata and SKILL.md don't declare any required credentials or config paths. Before installing: 1) inspect the TOOLS.md at that path (or avoid placing secrets there) and confirm you trust its contents and the configured apiUrl; 2) ask the author to document the credential source or switch to explicit environment variables or a secure config mechanism; 3) consider removing or questioning the always: true flag — don't enable this skill as always-on unless you understand why it must run in every agent session; 4) if you must try it, run it in a limited/sandboxed environment first and verify network endpoints the skill calls are your ZenTao server(s). The behavior is likely explainable (design choice), but the undisclosed credential access and always-on setting make this suspicious and worth extra caution.
cli.js:9
Environment variable access combined with network send.
index.js:5
Environment variable access combined with network send.
!
cli.js:2
File read combined with network send (possible exfiltration).
!
index.js:1
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

📋 Clawdis
Binsnode
latestvk97aapfj98xq9e0gpr9czbrp0h83n0xr
130downloads
0stars
3versions
Updated 1mo ago
v1.0.2
MIT-0

cym-zentao - 禅道项目管理 CLI

命令

login

测试登录:

cym-zentao login

list-executions

列出执行(项目迭代):

cym-zentao list-executions [keyword]

create-task

创建任务:

cym-zentao create-task <executionId|executionName> <name> <assignedTo> [options]

参数说明:

  • executionId|executionName: 执行ID(数字)或执行名称(支持模糊匹配)
  • name: 任务名称
  • assignedTo: 指派给(用户名)
  • options: JSON 字符串,可选参数

options 格式: JSON 字符串

  • pri: 优先级 (1-4)
  • estimate: 预计工时
  • type: 任务类型
  • estStarted: 开始日期 (YYYY-MM-DD)
  • deadline: 截止日期 (YYYY-MM-DD)
  • desc: 描述

示例:

# 使用执行ID
cym-zentao create-task 6159 "测试功能" "陈跃美"

# 使用执行名称(支持模糊匹配)
cym-zentao create-task "日常事务-郑太相" "测试功能" "陈跃美"

# 带选项
cym-zentao create-task 6159 "测试功能" "陈跃美" '{"pri":2,"estimate":8,"type":"test"}'

create-tasks-batch

批量创建任务(从 JSON 文件):

cym-zentao create-tasks-batch <executionId|executionName> <tasksFile>

tasksFile 格式: JSON 数组,每个元素包含:

  • name: 任务名称(必填)
  • assignedTo: 指派给(必填)
  • estimate: 预计工时
  • estStarted: 开始日期 (YYYY-MM-DD)
  • deadline: 截止日期 (YYYY-MM-DD)
  • type: 任务类型,默认 "test"
  • pri: 优先级,默认 3
  • desc: 描述

示例文件 tasks.json:

[
  {"name": "调研功能", "assignedTo": "1010753", "estimate": 6, "estStarted": "2026-03-25", "deadline": "2026-03-25"},
  {"name": "编写代码", "assignedTo": "1010753", "estimate": 6, "estStarted": "2026-03-26", "deadline": "2026-03-26"},
  {"name": "测试功能", "assignedTo": "1010753", "estimate": 6, "estStarted": "2026-03-27", "deadline": "2026-03-27"},
  {"name": "验收功能", "assignedTo": "004936", "estimate": 1, "estStarted": "2026-03-27", "deadline": "2026-03-27"}
]

使用示例:

cym-zentao create-tasks-batch "日常事务-郑太相" tasks.json

list-tasks

列出任务:

cym-zentao list-tasks <executionId|executionName> [status]

示例:

# 使用执行ID
cym-zentao list-tasks 6159

# 使用执行名称
cym-zentao list-tasks "日常事务-郑太相"

# 按状态筛选
cym-zentao list-tasks 6159 "doing"

自然语言创建任务

你也可以用自然语言描述来创建任务,AI 会自动解析:

单任务创建

给陈跃美在日常事务-郑太相下面创建明天的任务,任务名称为"测试功能",任务预计耗时6小时

AI 会解析出:

  • 执行名称:日常事务-郑太相
  • 任务名称:测试功能
  • 指派给:陈跃美
  • 开始日期:明天
  • 预计工时:6小时

批量任务创建

在禅道"日常事务-郑太相"下面创建任务:
时间2026-3-25,任务调研skills实现,预计耗时6小时,指派给陈跃美
时间2026-3-26,任务编写skills代码,预计耗时6小时,指派给陈跃美
时间2026-3-27,任务测试skills功能,预计耗时6小时,指派给陈跃美
时间2026-3-27,任务验收skills功能,预计耗时1小时,指派给郑太相

AI 会:

  1. 首先查找执行"日常事务-郑太相"的ID
  2. 批量创建4个任务,分别设置正确的日期、工时和指派给
  3. 返回创建结果汇总

Comments

Loading comments...