MiniMax Token Plan Usage Monitor

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill’s monitoring purpose is coherent, but its scripts include hardcoded passwords, OpenClaw auth/session tokens, and a fixed QQ notification recipient instead of user-scoped configuration.

Do not install or run this skill as-is. Ask the publisher to remove all hardcoded passwords, tokens, session keys, paths, and QQ recipients; require credentials through OpenClaw secrets or env vars; verify the notification target; and only then enable any cron schedule.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI03: Identity and Privilege Abuse
High
What this means

Running the skill could use account or local-agent credentials the user did not configure, and a valid embedded OpenClaw token could bypass normal per-user authorization.

Why it was flagged

The script embeds a MiniMax password-like secret and an OpenClaw local API bearer token instead of using declared per-user credentials.

Skill content
const password = 'sym,1998'; ... 'Authorization': 'Bearer 8d9c37620f26ffb66ec81daba1547ac537b6dee5aa0cc8fd'
Recommendation

Do not run as-is. Remove hardcoded secrets, declare required credentials, and read MiniMax/OpenClaw credentials only from per-user secrets or environment variables.

#
ASI02: Tool Misuse and Exploitation
High
What this means

MiniMax usage reports could be sent to a hardcoded QQ target that may not belong to the installing user.

Why it was flagged

The notification tool is invoked with a fixed QQ recipient rather than a user-configured destination or explicit approval.

Skill content
const userId = '9BB108CD680D558F5BB78A066DF4FB37'; ... args: { channel: 'qqbot', target: userId, message: message }
Recommendation

Require the notification recipient to be configured by the installing user, avoid embedded targets, and confirm before sending reports through messaging tools.

#
ASI07: Insecure Inter-Agent Communication
High
What this means

Actions and messages may be routed through a specific preconfigured agent session rather than the user’s own session boundary.

Why it was flagged

The script sends a prompt to a hardcoded OpenClaw session through the local chat-completions gateway and asks that session to run a script and notify “me”.

Skill content
const bbSessionKey = 'agent:bb:qqbot:direct:9bb108cd680d558f5bb78a066df4fb37'; ... path: '/v1/chat/completions' ... '执行MiniMax用量查询脚本并通过QQ发送通知给我。'
Recommendation

Remove hardcoded session keys and agent-to-agent prompts; use an explicit user-selected session with clear authentication and permission boundaries.

#
ASI09: Human-Agent Trust Exploitation
Medium
What this means

Users may underestimate the account and messaging privileges involved before installing or running the skill.

Why it was flagged

The registry metadata does not disclose credential requirements even though the documentation and code require or embed MiniMax/OpenClaw credentials.

Skill content
Required env vars: none; Env var declarations: none; Primary credential: none
Recommendation

Update metadata to declare required MiniMax credentials and notification/gateway configuration, and ensure documentation matches the actual code path.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

Installing dependencies may pull substantial browser automation code and stealth tooling into the OpenClaw environment.

Why it was flagged

The skill depends on browser automation packages, including a stealth plugin; this is plausible for scraping but should be reviewed and pinned/declared clearly.

Skill content
"dependencies": { "playwright": "^1.59.0", "puppeteer-core": "^24.40.0", "puppeteer-extra": "^3.3.6", "puppeteer-extra-plugin-stealth": "^2.11.2" }
Recommendation

Review the lockfile and dependencies before installation, remove unused stealth tooling if not needed, and declare runtime requirements in the skill metadata.

#
ASI10: Rogue Agents
Low
What this means

Once enabled, the skill may repeatedly log in to MiniMax, query account data, and write logs without further prompts.

Why it was flagged

The documentation recommends a recurring cron job, which is purpose-aligned monitoring but creates ongoing background activity.

Skill content
0 10,12,14,16,18,20,22 * * * /usr/bin/node /root/.openclaw/workspace/skills/minimax-token-plan/scripts/get_token_plan_usage.js >> /root/.openclaw/workspace/skills/minimax-token-plan/cron.log 2>&1
Recommendation

Enable cron only after verifying credentials, recipients, and log locations; document how to disable the schedule.