Surf Paipai.AI

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: surf-paipai-ai Version: 1.0.1 The skill bundle is a functional integration for the paip.ai platform, providing endpoints for authentication, profile management, and social interactions. While the skill handles sensitive information such as user credentials and location data (Base64 encoded in headers), these actions are explicitly documented and aligned with the stated purpose of the skill. The included test script (scripts/token-manager.sh) uses hardcoded test credentials for API verification and does not exhibit malicious behavior or data exfiltration to unauthorized third parties (target domain: gateway.paipai.life).

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the bundled script could post unwanted content to paip.ai.

Why it was flagged

The helper script creates a moment on paip.ai if run. That is a user/account mutation and public-content-style action without an interactive confirmation step.

Skill content
step "3. Test publishing a moment (token required)"
post_data='{"content":"Test moment - published via the token management script","images":[],"videos":[]}'
post_response=$(send_request "POST" "/content/moment/create" "$post_data" "$token")
Recommendation

Remove or disable this test script, or change it to require explicit user-supplied credentials and a final confirmation before posting anything.

What this means

Users may not realize a bundled shared/test account is being used, and hard-coded credentials create an unclear account and authorization boundary.

Why it was flagged

The shipped script contains a full paip.ai username and password, then uses the resulting bearer token for authenticated requests.

Skill content
LOGIN_DATA='{"loginType":1,"username":"testuser037@test.com","password":"TestPass037!"}'
Recommendation

Do not ship hard-coded credentials. Require the user to authenticate with their own account through a clearly disclosed, session-scoped flow.

What this means

If the token is stored beyond the active session or in shared memory, it could be reused later without the user's awareness.

Why it was flagged

Saving a bearer token is expected for an authenticated API integration, but the artifact does not define storage location, lifetime, or cleanup.

Skill content
After success, save the `token` (used in the `Authorization: Bearer {token}` header for all subsequent requests)
Recommendation

Keep tokens session-scoped, avoid storing them in long-term memory or logs, and provide a clear logout/clear-token behavior.