Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

DeepSeek Web Query

v1.0.0

使用 DeepSeek 网页版进行互联网查询,分担大模型请求和搜索负担。当用户需要查询最新信息、一般性知识、代码问题、文本分析等,或明确说"用 DeepSeek 查一下"、"联网搜索"、"查下最新"等时触发此技能。特别地,如果提问以"ds:"或"ds:"开头,优先使用此技能。通过 Chrome DevTools...

0· 92·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill claims only a web-query helper and declares no required binaries or env vars, but SKILL.md and the shipped scripts clearly require mcporter, npx/node, a Chromium browser, and Playwright (pip + playwright install). Those tools and operations (starting/stopping browsers, mcporter server add/remove) are not declared in registry metadata and are more powerful than what the high-level description suggests.
!
Instruction Scope
Runtime instructions direct the agent to run mcporter commands, npx chrome-devtools-mcp, PowerShell Invoke-WebRequest to local CDP, control the browser via CDP, read the page DOM and the clipboard, and persist/inspect snapshots. While these actions are related to web scraping, they extend into system-level operations (service configuration, clipboard access, local network calls) that go beyond a simple 'search' instruction and could be abused or misconfigured.
!
Install Mechanism
There is no declared install spec, yet instructions tell the agent to invoke npx chrome-devtools-mcp@latest and rely on Playwright. Using npx fetches and runs packages from the npm registry at runtime (transient download/execute), and Playwright requires pip installs and browser binaries — both increase risk. The skill's metadata does not document these runtime downloads or required installs.
Credentials
The skill declares no required environment variables or credentials (good), but it writes local files (.browser_state, deepseek_auth.json) and requires clipboard and browser permissions. Persisted auth/state files may contain sensitive session info. It also suggests prompting the user to log in via the browser (so credentials are entered into the DeepSeek site), which is expected but means the skill will operate with whatever session the user establishes in their browser.
!
Persistence & Privilege
The skill keeps browser sessions open and writes state/auth files in its directory. More importantly, it instructs changing mcporter's server configuration (mcporter server remove/add), which alters a system/global tool configuration and could affect other skills or services. Although always:false, the ability to modify global service registrations and to run arbitrary npx commands is elevated privilege and should be treated cautiously.
What to consider before installing
This skill appears to do what it says (control a browser to query DeepSeek) but the implementation requires extra system tools and performs global operations that the metadata does not declare. Before installing or using it: - Do not assume 'no requirements' — ensure you have or are willing to allow mcporter, Node/npm (npx), and Playwright (Python package + browser) to be installed and executed. npx will download and run code from npm at runtime. - Review the shipped Python scripts yourself (they write .browser_state and deepseek_auth.json) and decide whether you are comfortable with local state storage of session information. - Be aware the skill will request clipboard and browser permissions and asks you to log into DeepSeek in your browser; it will operate using that session. - The skill modifies mcporter server configuration (remove/add). If you use mcporter for other integrations, this could affect them — run in an isolated environment or back up mcporter configs first. - Prefer running this in a sandboxed machine or VM, or only after auditing the exact npx package being invoked (pin versions rather than using @latest). If you cannot audit the code or accept the runtime downloads and global mcporter changes, treat this as untrusted and do not install it.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f60c1v4vx7q54bv1s7qffdx83cd9w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments