WeChat Channel Live Replay
Analysis
The skill mostly matches its stated purpose, but it builds persistent output paths from user-provided channel/date strings without visible path containment, so a crafted request could make it write outside the intended folder.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
script_dir = REPLAY_INPUT_BASE / args.keywords / args.date if args.date else REPLAY_INPUT_BASE / args.keywords ensure_dir(script_dir) txt_path = script_dir / "script.txt"
The output directory for the transcript is built directly from command-line arguments. Path separators or absolute paths in --keywords or --date could escape the intended live-replay-analyzer input directory.
source: https://github.com/your-repo/wechat-channel-live-replay requirements: - python - "pip:requests" - "pip:openai-whisper" - "exec:ffmpeg" - "skill:douyin-video-transcriber"
The source URL appears placeholder-like and dependencies are unpinned/manual, while the registry has no install spec. This is not inherently malicious, but provenance and dependency versions are not well established.
cmd = ['ffmpeg', '-i', video_path, '-vn', '-acodec', 'libmp3lame', '-y', audio_path] result = subprocess.run(cmd, capture_output=True, text=True, encoding='utf-8', errors='replace')
The skill invokes the local ffmpeg executable to extract audio. This is disclosed and central to transcription, but it is still local command execution on downloaded media.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
token = get_config_value('tikhub_api_token', os.getenv('TIKHUB_TOKEN'))
headers = {
'Authorization': f'Bearer {token}',
'Accept': 'application/json'
}The skill reads a local TikHub API token from OpenClaw config or an environment variable and sends it as a bearer token. This is expected for the TikHub integration, but the registry metadata declares no primary credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`script.txt` 会自动保存到 `live-replay-analyzer` 的输入目录中。 用户可以直接调用 `live-replay-analyzer` 技能,使用本技能生成的文字稿来生成复盘报告。
The skill intentionally persists transcribed content for reuse by another skill. That is purpose-aligned, but the transcript should be treated as untrusted data when later analyzed.
