Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Agresource
v1.0.0Scrapes and summarizes AgResource grain newsletters with daily sales advice, price-impact sentiment analysis, trend tracking, and Telegram alerts on updates.
⭐ 0· 659·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill's name/description align with the code: it scrapes AgResource, analyzes sentiment, stores summaries, and (per SKILL.md) sends Telegram alerts. However, registry metadata lists no required environment variables while the code expects AGRESOURCE_EMAIL and AGRESOURCE_PASSWORD (and likely Telegram credentials). That mismatch is incoherent and should be corrected.
Instruction Scope
SKILL.md instructs the agent to log in to the AgResource dashboard using environment credentials, scrape pages with Playwright, save screenshots, and write multiple files under ~/clawd/memory/agresource. That scope is consistent with the stated purpose, but the instructions (and code) embed fallback credentials and write full newsletter content and screenshots to disk—sensitive actions that require explicit declaration and user consent.
Install Mechanism
There is no install spec (instruction-only install), which keeps risk lower in terms of arbitrary downloads. The code depends on Playwright/Node and Python; SKILL.md claims Playwright is available locally. Installing Playwright/Chromium can download large browser binaries, but no external or obfuscated download URL is present in the package itself.
Credentials
The code uses AGRESOURCE_EMAIL and AGRESOURCE_PASSWORD but the registry metadata didn't declare any required env vars or a primary credential—this is a mismatch. Worse, the JS files include plaintext fallback values (e.g., 'brianppetty@yahoo.com' and '4BrynnElizabeth'), which is a sensitive hard-coded credential leak. SKILL.md also promises Telegram alerts but no Telegram credential is declared in metadata; the skill may expect additional tokens (e.g., TELEGRAM_BOT_TOKEN, CHAT_ID) that are not surfaced.
Persistence & Privilege
always is false and the skill does not request system-wide changes; it writes files into a dedicated ~/clawd/memory/agresource directory which matches its purpose. It does not appear to modify other skills or global agent settings.
What to consider before installing
This skill's functionality (scraping AgResource, summarizing, sentiment tracking, saving files, sending Telegram alerts) is coherent, but there are important security and privacy issues you should address before installing:
- Do not accept the skill as-is. The code includes hard-coded fallback credentials (email and password) in multiple JS files. Treat those as compromised: they should be removed and rotated if they are real.
- The registry metadata does not declare required environment variables even though the skill expects AGRESOURCE_EMAIL and AGRESOURCE_PASSWORD (and likely Telegram tokens). Ask the author to declare required env vars explicitly (and avoid embedding defaults in code).
- Verify where Telegram alerts are implemented and whether a bot token or chat ID is required; those credentials must be declared and scoped appropriately.
- The skill uses Playwright to control a browser and will save screenshots and full newsletter content to ~/clawd/memory/agresource; confirm you are comfortable with that storage (it may contain subscription-protected content). Consider restricting file permissions or changing the storage path if needed.
- Inspect the full code (particularly any omitted/truncated parts) for network calls beyond agresource.com (e.g., unexpected remote endpoints) before giving it access to your credentials.
- If you plan to use the skill, require the author to remove embedded credentials, update registry metadata to list required env vars, and document what external services are contacted. If the embedded credentials are yours or someone you know, rotate them immediately.
If you want, I can: (1) list the exact files/lines where hard-coded credentials appear, (2) search the remaining truncated code for Telegram/network endpoints, or (3) suggest a minimal safe configuration checklist to prepare before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk977vnc0mk23g2j2w5jqhnetw981eq3r
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
