Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Wechat Article Optimizer

v1.0.0

微信公众号文章优化,标题生成、封面建议、排版优化、发布时间推荐。适合自媒体运营、内容创作者。

0· 51·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md describes a pure text/content optimization skill (title, cover suggestions, formatting, publish time) and does not require any runtime binary. However metadata declares a required binary: node. Since the skill contains no code files and no install steps, requiring Node is disproportionate and suggests either a metadata error or missing code/behavior that wasn't included.
Instruction Scope
The runtime instructions are limited to content transformations and recommendations based on user-supplied article text. They do not ask the agent to read system files, environment variables, or send data to third-party endpoints; they stay within the declared editorial scope.
Install Mechanism
There is no install spec and no code files; this is instruction-only, so nothing will be written to disk or downloaded by the skill as provided.
Credentials
The skill requests no environment variables, credentials, or config paths. For the functionality described, that is appropriate and least-privileged.
Persistence & Privilege
The skill uses default privileges (not always-enabled, agent invocation allowed). It does not request persistent presence or broader system configuration changes.
What to consider before installing
The skill's content and instructions look appropriate for a WeChat article optimizer. The main red flag is the metadata declaring node as a required binary despite there being no code or install steps — this could be a harmless metadata typo or may indicate missing code that would run under Node. Before installing, ask the publisher why 'node' is required or request the source code/installation steps. If you proceed, monitor future versions for added install scripts, external network calls, or new environment-variable requirements. Because of the unexplained node requirement, treat this skill as suspicious until the author clarifies.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b2htaywjzvn9cywmda7p73x83kh81

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📝 Clawdis
Binsnode

Comments