Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Data Sentinel Pro

v1.0.0

7x24 小时监控网页、商品价格、竞对动态,变化即通知。 Use when: 用户需要监控特定网页的变化(价格、内容、状态)。 NOT for: 一次性数据查询,实时聊天。

0· 43·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (web/page/price monitoring + notifications) matches the code: scripts/monitor.py fetches pages, computes hashes, extracts prices, and sends Telegram/email notifications. However the registry metadata declares no required env vars or config paths while the SKILL.md and the script expect a local config (~/.openclaw/openclaw.json) containing license_key, notification tokens, and email credentials — this mismatch is unexplained.
!
Instruction Scope
SKILL.md instructs adding credentials and configuration to ~/.openclaw/openclaw.json and references storing monitors under ~/.openclaw/workspace/..., but the actual script reads ~/.openclaw/openclaw.json (consistent) and writes per-URL JSON files to ~/.openclaw/data/sentinel (inconsistent with the SKILL.md storage path). The instructions also say to use a 'browser skill' but the shipped script uses requests (server-side fetch) — not harmful but inconsistent. The script will read local config files (potentially containing secrets) and will make outbound calls to monitored URLs and to api.telegram.org when configured.
Install Mechanism
This is an instruction-only skill with a single Python script and no install spec — it doesn't download or execute installers at install time. That is low-risk from an install mechanism perspective.
!
Credentials
The registry lists no required env vars or config paths, yet SKILL.md asks users to place sensitive tokens/credentials (telegram_token, telegram_chat_id, email_user, email_pass, license_key) into a local config file which the script will read. The skill therefore expects access to sensitive credentials but that access was not declared in metadata. Also package.json exists but lists Python packages (requests, beautifulsoup4) — a mismatched metadata file that suggests sloppy packaging or a copy-paste; this inconsistency reduces trust and should be clarified before providing secrets.
Persistence & Privilege
The skill does not request permanent 'always:true' inclusion and does not modify other skills. It will create a local directory (~/.openclaw/data/sentinel) and store per-URL JSON files; it suggests (but does not force) adding cron jobs. These are normal for a monitoring utility and do not indicate elevated privileges.
What to consider before installing
This skill's functionality (fetch page, detect changes, send Telegram/email) is consistent with its description, but there are several red flags you should address before installing or supplying credentials: - Metadata vs runtime mismatch: the registry declares no required env vars/config paths, but SKILL.md and the script expect ~/.openclaw/openclaw.json to hold license_key, telegram_token, email credentials, etc. Treat any credential requests as sensitive and avoid entering real, high-privilege secrets until you verify the source. - Storage path mismatch: SKILL.md documents storing monitors under ~/.openclaw/workspace/..., but the script writes to ~/.openclaw/data/sentinel. Confirm where data and credentials will be stored and back up or inspect those files after installation. - package.json oddity: a Node package.json lists Python libraries (requests, beautifulsoup4). This suggests sloppy packaging or an unreviewed third-party. Prefer installing only after reviewing the repository (the SKILL.md points to a GitHub URL — inspect that repo) or running the script in an isolated environment. - Network behavior: the script will fetch arbitrary URLs you configure and will post notifications to api.telegram.org if a Telegram token is provided. It does not appear to exfiltrate data to unknown endpoints, but because it reads local config and could contain secrets, verify the code yourself or run it in a sandbox. What would increase confidence: a verified repository/source (matching code), updated metadata that declares required config/env vars, correction of the storage-path inconsistencies, and clearer packaging (a requirements.txt or proper packaging for Python rather than package.json). If you cannot verify these, avoid providing real credentials (use a throwaway Telegram bot/chat for testing) and run the script in an isolated account/container.

Like a lobster shell, security has layers — review code before you run it.

latestvk977n76txtyva7pq0sfesrsa79846nrr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments