Back to skill
Skillv1.0.0
ClawScan security
MONK-EYE Engine · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 24, 2026, 2:20 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's stated purpose (deep forum research) matches most of its code, but there are configuration and scope inconsistencies that could enable unexpected file access and possibly scraping of sensitive/private forum content—review before installing.
- Guidance
- This skill aims to scrape and synthesize forum content, including many hacking/gray-hat forums. Before installing: (1) inspect and fix the hard-coded paths—oracle_engine.py points to a different skill folder (global-forum-oracle), which may read files outside this package or simply fail; (2) consider whether you want an agent that tries to 'follow internal links' and access possibly private/credentialed pages—decide and implement explicit guards; (3) run it in a sandboxed environment and restrict network access if you’re uncomfortable with scraping questionable forums; (4) if you will allow autonomous invocation, prefer limiting scope or adding explicit policies preventing attempts to access private resources or to use host credentials; (5) verify authorship and provenance (source is unknown) and prefer skills from verifiable maintainers.
Review Dimensions
- Purpose & Capability
- noteThe skill claims to crawl niche forums and synthesize reports; package.json lists requests/beautifulsoup4 and the scripts generate site: queries and log deep crawling—these align with the stated purpose. However, the included monitored forum list contains many forums associated with illicit/gray-hat activity (exploit.in, antichat, blackhatworld, spyhackerz, turkhackteam, wickedfire), which is consistent with the description but increases the risk that outputs may include wrongdoing-related content. Also the code hard-codes absolute workspace paths (see below), which is odd for a portable skill.
- Instruction Scope
- concernSKILL.md explicitly describes 'infiltration' and 'following internal links to private documentation' and the code prints that it's following 'internal links to private documentation'—this suggests behavior beyond passive search (attempting to access linked/private resources). The runtime instructions do not limit or authorize use of credentials, but the wording could lead an agent to attempt to access restricted pages or aggregate sensitive data. The oracle script generates many site: search tasks which would be submitted to a search/browser tool—there is no explicit safeguard about accessing private or credential-protected content.
- Install Mechanism
- okThere is no external install script or remote download; dependencies are standard Python libs (requests, beautifulsoup4) listed in package.json and SKILL.md tells the user to pip-install them. Being instruction-only with local files reduces install risk. No URLs or install extracts are present.
- Credentials
- concernThe skill declares no required env vars or credentials (which is consistent), but the code uses absolute file paths under /root/.openclaw/workspace/skills/ — monk_eye_core.py reads its own config at /root/.openclaw/.../monk_eye_config.json (reasonable though non-portable), while oracle_engine.py points to /root/.openclaw/workspace/skills/global-forum-oracle/forums.json (a different skill path). That cross-skill absolute path is incoherent with the provided forums.json in this package and could cause the skill to read files belonging to other skills or to fail in non-root installs. This is a notable red flag for unauthorized file access or misconfiguration.
- Persistence & Privilege
- noteThe skill is not marked always:true and does not request elevated runtime privileges. Model invocation is allowed (default), so it can run autonomously when triggered. Autonomous invocation combined with the cross-skill file path and the 'infiltration' wording increases potential blast radius, but by itself persistence/privilege settings are normal.
