Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Data Sentinel Pro
v1.0.27x24 小时监控网页、商品价格、竞对动态,变化即通知。 Use when: 用户需要监控特定网页的变化(价格、内容、状态)。 NOT for: 一次性数据查询,实时聊天。
⭐ 0· 86·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description (web/page/price monitoring) aligns with the included Python monitoring script that fetches pages, computes hashes, extracts prices, stores per-URL state, and sends Telegram notifications. However there are oddities: SKILL.md and README reference storing runtime data under ~/.openclaw/workspace/skills/data-sentinel-pro/data/monitors.json while the scripts actually use ~/.openclaw/data/sentinel and per-URL md5.json files. package.json/metadata versions and paths differ and both monitor.py and scripts/monitor.py are duplicated but identical, which is unnecessary but not by itself malicious.
Instruction Scope
Runtime instructions are generally scoped to monitoring tasks, cron usage, and sending notifications. The SKILL.md suggests using a 'browser skill' to obtain page content, but the script itself uses requests; this mismatch could confuse users. The script reads ~/.openclaw/openclaw.json to obtain the skill config (telegram token/chat id, email settings) and posts to Telegram's API — behaviour expected for notification delivery. Instructions reference fields (license_key, email_pass) that the script does not use or implement, which is inconsistent and increases uncertainty about intended behavior.
Install Mechanism
No install spec is present (instruction-only packaging with included Python scripts). That reduces install-time risk because nothing downloads arbitrary external code at install. The package declares Python runtime and common dependencies (requests, BeautifulSoup).
Credentials
The skill declares no required environment variables but SKILL.md asks users to add sensitive values (telegram_token, telegram_chat_id, email_user/email_pass, license_key) into ~/.openclaw/openclaw.json. Requesting a Telegram bot token and chat id is proportionate to sending notifications; storing SMTP credentials is explainable for email alerts but the script currently does not implement email sending (email logic is commented), and license_key is not used — these unused/extra credential fields are unnecessary and cause mild concern. Users must not commit that config file to version control; the SKILL.md warns of this.
Persistence & Privilege
The skill does not request special platform privileges, does not set always:true, and does not modify other skills. It writes state to a local directory under the user's home (~/.openclaw/data/sentinel) and is intended to be run by cron or manually — this is consistent with a monitoring tool.
What to consider before installing
Things to check before installing or running:
- Source verification: the package lists an author and GitHub URL in docs, but the registry 'Source' is unknown and homepage is empty; verify the upstream repository/author and confirm the code hasn't been tampered with.
- Config mismatch: the SKILL.md and README reference different storage/config paths (~/.openclaw/workspace/skills/... vs ~/.openclaw/data/sentinel) and example monitors.json; the scripts actually write per-URL files under ~/.openclaw/data/sentinel. Confirm you understand where data and credentials will be stored.
- Credentials: the skill will read ~/.openclaw/openclaw.json and use any telegram_token/telegram_chat_id found there to call api.telegram.org. Only provide a bot token with minimal permissions, and do not reuse high-privilege tokens or other service credentials. Prefer creating a dedicated notification bot/account.
- Unused/extra fields: SKILL.md asks for license_key and email SMTP creds, but the script does not use license_key and email sending is not implemented; avoid putting secrets in the config unless you confirm the code actually needs them.
- Duplicate files & packaging: there are duplicated scripts (monitor.py and scripts/monitor.py) and minor metadata version mismatches; this is likely sloppy packaging rather than malicious, but prefer the code from a verified source.
- Network & cron: the script fetches arbitrary URLs and posts to Telegram; if you cron it, be mindful of target URL load and legal/ethical scraping limits. Review cron entries and logs before deploying system-wide.
If you want higher assurance: obtain the repository URL from the author and inspect git history, confirm that the code in the published package exactly matches the upstream repo, or run the script in an isolated test account or VM without real credentials to observe behavior. If anything about the source or file inconsistencies cannot be explained, treat the skill with caution.Like a lobster shell, security has layers — review code before you run it.
alertvk9764rrtyw1t7bfxdzwm17rj8h84ggwglatestvk9764rrtyw1t7bfxdzwm17rj8h84ggwgmonitoringvk9764rrtyw1t7bfxdzwm17rj8h84ggwgprice-trackervk9764rrtyw1t7bfxdzwm17rj8h84ggwgweb-scrapervk9764rrtyw1t7bfxdzwm17rj8h84ggwg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
