Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Ehr Semantic Compressor
v0.1.0AI-powered EHR summarization using Transformer architecture to extract key clinical information from lengthy medical records
⭐ 0· 104·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md and references claim a Transformer encoder‑decoder, fine‑tuning on clinical corpora, and heavy ML deps (transformers, torch, scispacy), but the provided scripts/main.py implements a purely extractive, keyword-and-frequency based summarizer with no imports or code using transformers/torch/scispacy. This is a substantive mismatch between claimed capability and actual implementation and could indicate inaccurate documentation or incomplete/placeholder packaging.
Instruction Scope
SKILL.md instructs local processing and explicitly states no external API calls — the visible code appears to operate locally on supplied text. However SKILL.md's testing section refers to running python test_main.py but no test_main.py is present in the package. Also SKILL.md lists many security checklist items (path traversal protection, prompt injection protections) but there's no clear evidence the CLI enforces all of those protections; the script validates input text length and JSON shape, but file-path validation and sandboxing are not shown in the visible code.
Install Mechanism
There is no install spec (instruction-only) — lowest install risk — but the packaging is inconsistent: references/requirements.txt lists heavy ML libs (transformers, torch, numpy) while the top-level requirements.txt contains the single line 'main' (nonsensical). If users install the referenced heavy dependencies they may pull large ML toolchains unnecessarily. The project either ships inaccurate dependency metadata or is incomplete.
Credentials
The skill declares no required environment variables, no credentials, and the code does not attempt to read secrets or network credentials. There is no evidence of unrelated credential requests.
Persistence & Privilege
The skill is not always-enabled and has no reported privilege to persist beyond its own files. It reads input files and writes output files (expected for a CLI summarizer). There is no indication it modifies other skills or global agent configs.
What to consider before installing
This package contains contradictions and incomplete packaging rather than obvious malicious code, but treat it cautiously:
- Don't assume the 'Transformer / fine-tuned model' claims are true — the included script is extractive and does not use heavy ML libraries. Ask the author which implementation is intended and request the actual model code if you expect a Transformer-based summarizer.
- Verify dependencies before installing: the top-level requirements.txt ('main') is invalid while references/requirements.txt lists large ML packages. Installing unnecessary ML libs could be costly and expose you to additional attack surface.
- Confirm missing tests and files: SKILL.md references test_main.py (not present). Ask for a complete test suite and a reproducible install/run guide.
- Check input-file handling and path validation: the README/checklist mentions protection against ../ traversal, but the code does not show explicit path-sanitization. If you will run this on real PHI, run it in an isolated/sandboxed environment and audit file-path handling to prevent reading unintended files.
- Validate that no network activity occurs at runtime: although SKILL.md states processing is local and visible code appears local, confirm there are no hidden calls or optional code paths that contact external endpoints (search dynamically for subprocess, urllib/requests, socket usage in the remainder of scripts/main.py or other files).
- If you plan to process Protected Health Information (PHI), perform a security and compliance review (logging, data retention, access controls) and consider running the skill in an isolated environment with non-production data first.
If you need a higher-confidence assessment, provide the full (untruncated) scripts/main.py and any additional files or a clarification from the author about intended model usage and expected dependencies.Like a lobster shell, security has layers — review code before you run it.
latestvk97fs2cre46kmrpr1abmepzd01837ap5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
