Back to skill
Skillv0.2.4
ClawScan security
科技新闻日报 · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
ReviewApr 19, 2026, 12:39 AM
- Verdict
- Review
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill mostly matches its stated purpose (collecting tech news and syncing to local + Feishu), but its runtime instructions contain hard-coded Feishu tokens/group IDs and implicit expectations (Feishu/Tavily credentials, local file writes) that are not declared — this creates a risk of sending reports to an external target without clear user consent.
- Guidance
- This skill appears to do what it claims (collect tech news and publish it), but the SKILL.md contains explicit Feishu group/chat IDs and example tokens and requires writing local checkpoint files — all without declaring Feishu/Tavily credentials. Before installing or enabling it, verify the following: (1) Confirm that any hard-coded IDs (chat: oc_d591432..., space_id, node_token, etc.) belong to *you* or are safe — if not, the skill will send reports to an external group. (2) Require the skill to request explicit Feishu credentials or to use only the user's authenticated session (do not accept hard-coded tokens). (3) If you allow local file writes, check where files are stored (memory/YYYY-MM-DD-tech-news.md and checkpoint JSON) and whether those files may include sensitive content. (4) Consider running this skill in a sandboxed or test environment first and monitor outbound messages. (5) If you need a safer alternative, remove/replace hard-coded endpoints and require explicit user confirmation before sending any messages to Feishu groups.
Review Dimensions
- Purpose & Capability
- concernThe declared purpose (daily tech-news aggregation, local Markdown + Feishu sync, and sending a Feishu message) aligns with the instructions. However, the SKILL.md contains hard-coded Feishu identifiers (a specific group chat id oc_d591432cedf9a00c01878c24754cb050 and example node/space tokens) and insists on sending messages to that target. Those hard-coded endpoints are not justified by the description and could route user data to a third party.
- Instruction Scope
- concernInstructions instruct the agent to run multi-step searches (tavily_search), merge and de-duplicate results, write local files under memory/YYYY-MM-DD-tech-news.md and a checkpoint JSON, create and write Feishu documents, and then mandatorily send a Feishu message to a specific chat. The skill also mandates preserving a subagent session until the Feishu message is sent. These actions access local storage and an external messaging endpoint; the hard-coded final message target and example tokens extend scope beyond a simple 'generate a report for the user' flow and risk exfiltration.
- Install Mechanism
- okNo install spec and no code files — instruction-only skill. This minimizes install-time risk because nothing is downloaded or written during installation.
- Credentials
- concernThe skill declares no required env vars or credentials, yet its runtime steps clearly require Feishu credentials/authorization and access to the 'tavily_search' tool. It also embeds sample space_id/node_token and a fixed chat id. This mismatch means the skill expects external credentials or platform-provided connectors without declaring them, which can lead to use of available credentials or writing to endpoints not owned by the user.
- Persistence & Privilege
- notealways:false and no special OS/config paths are requested. The skill writes files under a 'memory' path and manages its own checkpoint file — normal for a reporting tool. The real concern is behavioral: the skill enforces sending the final report to a specific Feishu chat and hard-codes tokens, which is a runtime action with non-trivial privacy/communication implications even if it doesn't request persistent privileges.
