Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

通义晓蜜 - 智能外呼

v1.0.1

触发阿里云晓蜜外呼机器人任务,自动批量拨打电话。适用于批量外呼、客户回访、满意度调查、简历筛查约面试等场景。可从前置工具或节点获取外呼名单。

0· 1.9k·0 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill's stated purpose (driving 阿里云晓蜜 outbound tasks) legitimately requires Alibaba Cloud credentials and a Node.js runtime, which the SKILL.md documents. However the registry metadata declares no required environment variables or primary credential, which is inconsistent with the documented need for ALIYUN_OUTBOUND_BOT_ACCESS_KEY_ID and ALIYUN_OUTBOUND_BOT_ACCESS_KEY_SECRET. Also the package claims to be instruction-only but includes a ~3.2MB bundled script, a mismatch in manifest vs. contents.
Instruction Scope
SKILL.md scopes operations to collecting phone lists, building an agentProfile, confirming with the user, then invoking node scripts/bundle.js. It explicitly requires user confirmation before dialing (good), but it also directs agents to pull phone numbers from preceding tools and to 'directly pass' them to the skill, which could enable dialing personal contact data if confirmation steps are bypassed. The instructions require environment variables (Aliyun AK/SK) and reference only the outbound bot console; they do not instruct reading unrelated system files.
Install Mechanism
There is no install spec (lowest install risk), but a large bundled JavaScript (scripts/bundle.js) is included and intended to be executed with node. Bundling is common, but the manifest claiming instruction-only while including executable code is an inconsistency worth noting. No external download URLs or install-from-internet steps were found.
!
Credentials
The SKILL.md requires two Alibaba Cloud credentials (ALIYUN_OUTBOUND_BOT_ACCESS_KEY_ID and ALIYUN_OUTBOUND_BOT_ACCESS_KEY_SECRET), which are proportionate to interacting with Alibaba Cloud. However the registry metadata does not declare these required environment variables or a primary credential — that mismatch reduces transparency and is a security concern because users may install without realizing they must supply sensitive keys. No other unrelated credentials are requested.
Persistence & Privilege
Skill flags are normal: always is false and autonomous invocation is allowed (platform default). The skill does not request permanent platform presence, nor does it declare modifications to other skills or global agent configuration.
What to consider before installing
This skill appears to implement Alibaba Cloud outbound-calling functionality and does require your ALIYUN AccessKey ID and Secret to operate, but the registry metadata fails to declare those env variables and the package contains a large bundled JS file. Before installing or running: 1) Confirm the publisher identity and source (no homepage provided). 2) Inspect scripts/bundle.js (or run it in a sandbox) to ensure there are no unexpected network endpoints or exfiltration behavior. 3) Only provide ALIYUN_* credentials you are willing to expose to this code; consider using a limited-permission account. 4) Test with non-sensitive phone numbers and verify the skill prompts for explicit confirmation before any call. 5) Ensure you comply with local regulations on automated calling and consent. If you need to proceed but lack the ability to audit the bundle, treat this as higher risk and avoid supplying real credentials or running in production.

Like a lobster shell, security has layers — review code before you run it.

latestvk977sdrygjx2da4cnna05jhzex80xcka

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments