Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Stock Monitor Pro
v3.1.0全功能智能股票监控预警系统。支持成本百分比、均线金叉死叉、RSI超买超卖、成交量异动、跳空缺口、动态止盈等7大预警规则。符合中国投资者习惯(红涨绿跌)。
⭐ 1· 151·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The code and SKILL.md implement the claimed stock-monitoring features (data fetch from Eastmoney/Sina, MA/RSI logic, AI analysis). However the package metadata declares no required binaries or env vars while the code expects python3, the OpenClaw CLI ('openclaw' command), and optional API keys (KIMI_API_KEY / STOCK_MONITOR_LICENSE). That mismatch (declaring none while code needs them) is an incoherence the user should be aware of.
Instruction Scope
Runtime instructions direct launching a background daemon and include a cron-like helper that, when alerts occur, will call the local OpenClaw CLI to send messages. cron_check.py hardcodes a FEISHU_USER_ID (ou_76cf01403b232cd9213972ea46c9ac9f) and constructs an 'openclaw message send --channel feishu --account main --target user:...' command; this will deliver alert text (including holdings, costs, shares) to that specific external recipient unless changed. SKILL.md does not disclose this hardcoded external target, nor does it instruct the user to change it before running.
Install Mechanism
There is no download/install spec (instruction-only style), which lowers installer risk. All code is provided in the bundle so nothing is fetched from arbitrary URLs. However the runtime expects the OpenClaw CLI and network access; these runtime dependencies are not declared in the registry metadata or SKILL.md.
Credentials
The skill metadata lists no required environment variables, but code references KIMI_API_KEY (ai_analyser.py) and VERSIONS.md mentions STOCK_MONITOR_LICENSE and KIMI_API_KEY for paid features. The package will attempt outbound HTTP calls to multiple third‑party endpoints (API hosts for AI: api.moonshot.cn, api.deepseek.com; finance data: eastmoney, sina, push2.eastmoney). Additionally, cron_check.py uses the OpenClaw CLI and its 'main' account; this combination allows transmitting user holdings and alerts externally. Declaring no env/credential requirements while accessing external APIs and sending messages is disproportionate.
Persistence & Privilege
The skill runs a background daemon (monitor_daemon.py) and stores logs and a PID under $HOME/.stock_monitor, which is normal for a monitor. always:false (no forced global inclusion). The main concern is that the daemon/cron helper will automatically emit alerts and (via OpenClaw) can send them outward; autonomous sending combined with the hardcoded recipient increases blast radius but by itself isn't a platform privilege escalation.
What to consider before installing
This skill appears to implement the described stock monitoring features, but there are several red flags you should address before installing or running it:
- Hardcoded external recipient: cron_check.py will send alert messages to a specific Feishu user ID (FEISHU_USER_ID) using the local OpenClaw CLI. If you run the daemon, your personal holdings/costs/alerts could be delivered to that account. Before using, change the FEISHU_USER_ID to your own target (or remove the auto-send behavior) and verify the 'openclaw message' command arguments.
- Undeclared runtime dependencies: the package metadata lists no required binaries/env vars, yet the code expects python3, the OpenClaw CLI on PATH, and optional API keys (KIMI_API_KEY, a license key). Make sure those tools/keys are present and intentionally configured before running.
- Sensitive data leakage risk: alerts include holdings, cost and share counts. Check all places where messages are sent (monitor_daemon prints 'ALERT:' which OpenClaw can capture; cron_check calls openclaw CLI) to ensure notifications go only to destinations you control.
- Review and sanitize WATCHLIST and any sample holdings: the provided WATCHLIST includes real-looking personal positions; replace with your own list or remove sensitive entries.
- Run in an isolated environment first: test locally in a sandbox or VM, and run the test-suite only after editing paths and targets (the tests assume certain WATCHLIST entries and external APIs which may fail or leak data).
- If you intend to use AI features, set KIMI_API_KEY yourself and confirm the AI endpoints and privacy policy are acceptable.
If you can confirm you will replace the hardcoded FEISHU target, explicitly set and control required env vars and CLI behavior, and run the code in an isolated environment, the skill is more acceptable. If you cannot or do not want to audit these changes, do not install or run the daemon.Like a lobster shell, security has layers — review code before you run it.
a-sharevk97bdqwf2d537f9bs5eawckrxx832w92ai-analysisvk97bdqwf2d537f9bs5eawckrxx832w92alertvk97bdqwf2d537f9bs5eawckrxx832w92latestvk97bdqwf2d537f9bs5eawckrxx832w92monitorvk97bdqwf2d537f9bs5eawckrxx832w92stockvk97bdqwf2d537f9bs5eawckrxx832w92
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
