Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Hna 666 Flight Checker
v1.0.0查询海南航空 666Plus 权益可往返航班,自动遍历指定目的地
⭐ 0· 56·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description match the code: scripts use Playwright to visit HNA's mobile query page and check for 666Plus round-trip availability. The included modules (city/date selectors, utils, etc.) are coherent with this purpose.
Instruction Scope
SKILL.md tells the agent to cd into a skill scripts folder and run a very specific Python binary: '~/.local/pipx/venvs/playwright/bin/python main.py --out ... --ret ... --headless --debug'. That absolute user-specific path (/home/wd and pipx venv path) is brittle and unexpected given the skill declared no required binaries or install steps. The runtime instructions do not document installing Playwright, Python, or browser binaries, yet the scripts launch a browser and run page.evaluate() calls — appropriate for the task but the instructions grant broad discretion to run arbitrary JS within the visited page (expected for automation but worth noting).
Install Mechanism
There is no install spec. The code requires Playwright and browser drivers but SKILL.md does not declare dependencies or provide an installation mechanism. The instruction's reliance on a specific pipx venv path is inconsistent and may fail or mask where the runtime python comes from.
Credentials
The skill requests no environment variables, no credentials, and no config paths. The scripts do not read secrets or system config. This is proportionate to its purpose.
Persistence & Privilege
Skill is not always-enabled and does not request elevated persistent privileges. It does run autonomously when invoked, which is the platform default, but there are no signs it alters other skills or system-wide settings.
What to consider before installing
What to consider before installing:
- This skill automates a browser (Playwright) to visit https://m.hnair.com and run DOM interactions; that behavior matches the stated purpose but requires Playwright and browser binaries which the skill does not install or declare. Expect to need Python, the 'playwright' package, and installed browser engines.
- The SKILL.md hard-codes a user-specific pipx/python path and a home path (/home/wd/.openclaw/skills/…), which is brittle and may not exist. Ask the author for clear dependency and install instructions or adjust the command to use a generic python on PATH.
- The code executes JavaScript in pages (page.evaluate). That is normal for web automation but means the skill can read and interact with page content. There are no external exfiltration endpoints in the code; network activity appears limited to the HNA query URL.
- The repository contains duplicate/unfinished files (a very large file with '仅存在缩进问题', truncations and indentation errors). This looks like messy or partially edited source — not necessarily malicious, but it increases the chance of runtime errors or unexpected behavior.
- Recommended actions: run this in an isolated environment (container or VM); verify and install Playwright and browsers yourself; replace the hard-coded pipx path with a known interpreter; review/clean duplicate files; and ask the publisher for an install/dependency manifest and an explanation of why multiple near-duplicate scripts exist. If you lack the ability to validate dependencies, avoid giving this skill access to sensitive environments.Like a lobster shell, security has layers — review code before you run it.
latestvk974h9qcmpsee6478xt1hnj4e183s26q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
