Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Social Media Content Scraper Pro

v1.0.0

Social Media Content Bulk Scraper, extract articles/posts from WeChat, Instagram, TikTok, YouTube, export to Markdown/HTML with full metadata. $0.005 USDT pe...

0· 66·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The README and UI advertise scraping WeChat, Instagram, TikTok, YouTube, and Twitter/X, but the server code only accepts and simulates mp.weixin.qq.com (WeChat) URLs and returns generated sample content. The frontend templates list multiple platforms, but backend route names and behavior are inconsistent (frontend calls endpoints like /start, /tasks, /task while backend defines /create_task, /task_status/<id>, /articles/<id>, etc.). This mismatch means the skill does not implement the multi-platform capabilities it advertises.
!
Instruction Scope
SKILL.md instructs a payment flow and entering profile URLs, which aligns with the included app, but the code will run a Flask web server, accept arbitrary profile URLs, download and store scraped content and images to a local data folder, and call external billing endpoints. The skill claims '100% safe and secure local data storage' despite storing arbitrary external HTML/content locally and serving it back via templates (possible XSS or serving of copyrighted/private content). Also the SKILL.md tells reviewers to 'review included files' — the code contains logic that will perform network calls and file writes not fully disclosed in SKILL.md.
!
Install Mechanism
There is no install specification even though the code imports third-party Python packages (requests, bs4/BeautifulSoup, pandas). Missing dependency declarations means runtime surprises. There is no external download/install step (low supply-chain risk), but the skill runs a web server and writes data to a local data directory — behavior not captured by an install manifest.
!
Credentials
The skill declares no required environment variables, yet the code contains hard-coded sensitive values: a SECRET_KEY and a SKILLPAY_API_KEY embedded in the source. Hard-coded API keys are a red flag (exposes credentials and indicates the skill will communicate with an external billing service). No justification is provided for embedding secrets or for not using environment variables. The skill also makes outbound HTTP requests to skillpay.me and arbitrary profile URLs.
Persistence & Privilege
always:false (default) and the skill does not request elevated platform privileges. It persists data in a local data directory and runs a Flask app; this is normal for a web tool but means the agent will create files and open a listening web interface if executed. That persistence is not inherently malicious but increases blast radius if combined with embedded secrets or network access.
What to consider before installing
This skill is inconsistent and risky in several ways. Before installing or running it: 1) Don't trust the embedded API key/SECRET_KEY — treat them as exposed. Ask the author to remove hard-coded secrets and require credentials via environment variables. 2) Confirm provenance and the SkillPay billing integration (whose API key is embedded) — avoid using that key; use your own account or sandbox. 3) Expect the backend to be WeChat-only and mostly simulated, despite UI claims for other platforms — request a clear feature matrix and working endpoints. 4) Run the code in an isolated sandbox (no sensitive network access, no production credentials) to inspect runtime behavior. 5) Require dependency listing (requirements.txt) and fix mismatched frontend/backend routes and obvious bugs (e.g., missing timedelta import). 6) Consider legal/ToS risks: bulk scraping social platforms may violate terms of service or copyright law. If you need a reliable scraper, ask the developer for a corrected, dependency-declared release, removal/rotation of embedded secrets, and proof that external billing/account keys are legitimate.

Like a lobster shell, security has layers — review code before you run it.

contentvk977vvs6crw1w8vnyphc7187v983g5hxlatestvk977vvs6crw1w8vnyphc7187v983g5hxmarketingvk977vvs6crw1w8vnyphc7187v983g5hxmonetizationvk977vvs6crw1w8vnyphc7187v983g5hxresearchvk977vvs6crw1w8vnyphc7187v983g5hxscrapervk977vvs6crw1w8vnyphc7187v983g5hxsocial-mediavk977vvs6crw1w8vnyphc7187v983g5hx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments