Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Conference Abstract Adaptor

v0.1.0

Adapt abstracts to meet specific conference word limits and formats

0· 92·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (adapt abstracts to conference formats) aligns with the included script: scripts/main.py reads an input file, parses/structures text, enforces/estimates word/char limits, and writes an adapted output. No unrelated binaries, env vars, or services are requested.
!
Instruction Scope
SKILL.md instructs running python scripts/main.py with file paths and claims input validation and sandboxing in the security checklist, but the runtime instructions grant the agent (or user) permission to supply arbitrary filesystem paths. The script opens files directly (open(args.abstract)) with no path canonicalization or traversal checks and does not catch exceptions, so it can read arbitrary local files and will surface stack traces on errors. This is scope creep relative to the claimed 'No unauthorized file system access' and 'Input file paths validated' checklist items.
Install Mechanism
No install spec; skill is instruction-only with one included Python script. Nothing is downloaded or executed from external URLs, and no packages are installed. This is low-risk from an install perspective.
Credentials
No environment variables, credentials, or config paths are requested. The requested capabilities (reading an input text file and optionally writing an output file) are proportionate to the stated purpose.
Persistence & Privilege
Skill does not request persistent or elevated privileges (always:false). It does not modify other skills or system configuration. It runs as an ad-hoc script when invoked.
What to consider before installing
This skill appears to implement the advertised functionality, but it is draft-quality and contains some security gaps you should consider before using it on sensitive data: - The script reads whatever path you pass; it does not check for '../' traversal, canonicalize paths, or restrict input to a safe workspace. A malicious or mistaken path argument could expose sensitive local files. Only run with input files you control, or add path validation (e.g., resolve realpath and ensure it is under an allowed directory). - The script lacks try/except around file operations and will print raw Python stack traces on errors (SKILL.md promised sanitized error messages). Consider adding exception handling to avoid leaking filesystem layout or other details. - There is no sandboxing or execution isolation required by the skill; run it in an isolated environment if abstracts contain sensitive or unpublished content. - The SKILL.md security checklist items (no traversal, sandboxing, sanitized errors) are NOT enforced by the code — treat them as TODOs, not guarantees. If you want to proceed: review or run the included scripts/main.py locally in a sandbox, add input path validation and error handling, and test with non-sensitive files first. If you need, ask the author to update the code to enforce workspace-restricted file access and to catch errors before installing or invoking this skill in production.

Like a lobster shell, security has layers — review code before you run it.

latestvk97512qc78c6e8enzrt7kbjfvx836swa

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments