Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Terabox Storage

v1.0.0

Manage TeraBox cloud storage operations including login, upload, download, share, and transfer. Use the terabox CLI tool for file management tasks.

2· 116·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name, description, and runtime instructions align: the skill installs/uses a terabox CLI and exposes upload/download/share/transfer commands. The included install/login/update scripts are consistent with delivering a CLI-based helper.
Instruction Scope
SKILL.md stays within the stated feature set (install CLI, run terabox commands, validate paths, require explicit triggers and confirmations). It references user config (~/.config/terabox/config.json) and instructs the agent to run auto-update and login scripts; those steps are reasonable for a storage helper but give the skill the ability to fetch code and perform network operations beyond the user's immediate command.
!
Install Mechanism
install.sh downloads a binary archive directly from a terabox CDN (s5.teraboxcdn.com) and installs to ~/.local/bin — a typical pattern but still a direct network download+extract. More importantly, update.sh fetches a remote update package (zip) from a terabox TCC API-returned URL and extracts it into the skill directory (and can replace the CLI binary). While update.sh includes optional checksum verification, it only uses the checksum if provided by the config API. Automatic remote extraction of archives that can modify skill files is a supply-chain risk.
Credentials
The skill does not request extra environment variables or unrelated credentials. Update.sh supports overriding the config API via TERABOX_UPDATE_API (useful for testing). Login uses an OAuth OOB code flow that does not ask for passwords or secrets in environment variables. No excessive credential access is declared.
!
Persistence & Privilege
always:false and no system-wide config edits are requested (good). However SKILL.md instructs the agent to run scripts/update.sh --yes before each operation (a silent, non-blocking auto-update). That gives the skill the ability to pull and apply code changes from a remote server automatically at runtime, which raises a maintenance/supply-chain privilege concern if the remote server or update process is compromised or misused.
What to consider before installing
This skill appears to be a legitimate TeraBox CLI wrapper, but exercise caution before installing: 1) Source provenance is unknown (no homepage) — prefer skills from known authors. 2) The skill auto-updates itself by contacting terabox.com and downloading a zip that can overwrite scripts and possibly the CLI binary; that means remote changes could change the skill's behavior without further consent. If you install, consider: - Inspecting the code files yourself (install.sh, login.sh, update.sh) and the initial VERSION file. - Running install.sh manually rather than letting the agent do it. - Disabling or auditing auto-updates: run update.sh --check first or remove the auto-update pre-execution call in SKILL.md, or run update.sh without --yes to require confirmation. - Ensure checksums are present and verified before allowing updates; prefer installing official release binaries from verified sources. - Avoid authorizing logins in shared or untrusted environments; login requires you to paste an OAuth code (manual step). If you cannot validate the update endpoint or the owner identity, treat this skill as higher-risk and consider declining installation.

Like a lobster shell, security has layers — review code before you run it.

latestvk97exep2092vqs86tr5cvj6af983czg3

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments