xiaohongshu-skill

v1.0.2

小红书自动化技能集合。支持认证登录、内容发布、搜索发现、社交互动、复合运营。 当用户要求操作小红书(发布、搜索、评论、登录、分析、点赞、收藏)时触发。

5· 1.1k·67 current·68 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The name/description (Xiaohongshu automation: login, publish, search, interact, ops) matches the included scripts and sub-skill SKILL.md files. The project provides a CDP-based Python automation engine, CLI commands, account management and publish pipelines — all expected for the stated purpose. Required binaries (python3, uv) align with the codebase.
Instruction Scope
The SKILL.md explicitly instructs the agent to only run the project's CLI (python scripts/cli.py) and to use absolute paths and user confirmation flows; that keeps runtime actions narrowly scoped to browser automation. However, SKILL.md and CLI cause the agent to: (a) start/manage Chrome with remote debugging, (b) write/read files under /tmp and the user's home (~/.xhs), (c) display QR codes and expose login URLs in responses. Those behaviors are necessary for automation but mean the skill will read/write persistent local state (profiles/cookies) and present external login links — review these flows carefully.
Install Mechanism
There is no automated install spec in the registry metadata (instruction-only SKILL.md), so nothing will be downloaded/installed automatically by the platform beyond the listed files. The README suggests manual download/uv sync to install Python deps; that is a reasonable, low-risk install approach when performed manually.
Credentials
The skill declares no required environment variables, which fits. However the code honors optional env vars (CHROME_BIN, XHS_PROXY) and will create persistent files under ~/.xhs (Chrome profiles, accounts.json) and temp session files; cookies and Chrome profiles persist login state and effectively store credentials/session tokens. Persisting session data is expected for browser automation, but it is sensitive — the skill does not declare these persistence details in the top-level requires.env. Verify you are comfortable with persistent browser profile/cookie storage and any proxy settings before use.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges, but it creates and manages persistent state: Chrome profiles and cookies under ~/.xhs, account metadata (~/.xhs/accounts.json), and session/login tab files under the temp directory. That grants the skill ongoing local access to authenticated sessions after login — expected for this use case but a material persistence/privilege consideration for security-conscious users.
Scan Findings in Context
[unicode-control-chars] unexpected: A pre-scan flagged unicode control characters inside SKILL.md. This can be benign (formatting, non-visible characters) but is a common pattern used in prompt-injection or obfuscation. The rest of the SKILL.md appears coherent, but you should inspect the SKILL.md raw bytes (and any non-ASCII characters) for hidden instructions or suspicious invisible characters that could alter how text is parsed or displayed to agents.
What to consider before installing
What to check before installing/using this skill: - Understand persistence: the tool creates ~/.xhs (Chrome profiles, accounts.json) and temporary session files; logged-in cookies and profiles are stored locally and grant ongoing access to your logged-in Xiaohongshu sessions. If you don't want persistent credentials on your machine, do not use it or run it in an isolated container or VM. - Inspect the SKILL.md and code you received (especially any non-ASCII/control characters). The scanner found unicode-control-chars in SKILL.md — open the file in a hex-capable editor to ensure there are no invisible manipulative characters. - Confirm provenance: source is listed as a GitHub repo; verify that the repo owner and releases are legitimate (check commit history, stars, issues). Prefer installing from an official GitHub release rather than a zip from an unknown mirror. - Run in an isolated environment for first use: a disposable VM, container, or dedicated user account will limit impact if something unexpected happens. After installation, inspect files created under ~/.xhs and temp directories. - Review optional env vars and network behavior: CHROME_BIN, XHS_PROXY can change runtime behavior (proxy routing). If you see unexpected proxy settings, do not proceed. The tool opens Chrome with remote-debugging; ensure your machine/network policies allow this. - Check and limit automation scope: the SKILL.md mandates using only this project's CLI — that is not malicious by itself, but be cautious when granting agents autonomous invocation; verify the agent only runs expected CLI commands and requires explicit user confirmation for publish/comment actions. If you want, I can (a) point out exactly which files persist sensitive data and where, (b) extract and show any non-printable characters from SKILL.md, or (c) suggest a minimal containment/run strategy (docker commands) for testing safely.

Like a lobster shell, security has layers — review code before you run it.

latestvk97d9fdg9m8f1kd7bab8v97zyd82mxyt

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📕 Clawdis
OSmacOS · Linux
Binspython3, uv

Comments