Clash Proxy
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill largely matches its stated purpose (managing a Clash/Mihomo proxy) but includes hard-coded external subscription URLs and backup node credentials that point to unknown domains/hosts — this is coherent with proxy functionality but poses risk and should be reviewed before installation.
This skill appears to be a legitimate Clash/Mihomo proxy manager, but it will download and apply external subscription data and can replace the local 'clash' binary. Before installing: (1) inspect and remove or replace the subscription URL in config.yaml — the provided URL points to an unknown domain; (2) remove or verify any hard-coded backup node servers/passwords in config.yaml; (3) if you allow updates, verify the downloaded Mihomo binary (check source and checksums) before replacing the executable; (4) run the skill in a restricted/sandboxed environment first (or a throwaway VM) to observe network behavior; (5) be aware that using unknown proxy nodes can expose or intercept your network traffic. If you cannot verify/trust the subscription/source hosts and embedded credentials, treat this skill as unsafe to run on production or sensitive systems.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
No VirusTotal findings
Risk analysis
No visible risk-analysis findings were reported for this release.
