Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
standard-book-learning
v1.0.0协调管理书籍学习流程,按顺序调用章节提取、笔记生成、图谱构建及导入模块,跟踪进度并生成总结报告。
⭐ 0· 92·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill name/description (book learning coordinator) aligns with the provided modules (book-extractor, note-generator, neo4j-cypher-generator, neo4j-importer) and the code implements the expected pipeline. Minor mismatch: all file paths and examples are Windows-specific (F:\book, F:\Obsidian) which reduces portability but is consistent with the described workflow.
Instruction Scope
SKILL.md instructs the agent to read local book files and write notes/progress to F:\Obsidian, and to call the four submodules in sequence — this is within the skill's purpose. The instructions do write to and read from local filesystem paths and expect a local Neo4j endpoint; that is expected for this functionality but means the skill will access user files under those paths.
Install Mechanism
There is no install spec (instruction-only), which is lower risk. The Python scripts reference external libraries (python-docx, PyPDF2, optional OCR libs) but the package/dependency list isn't declared in the registry metadata; users must install these manually. No network download/install URLs were found.
Credentials
The registry declares no required environment variables or credentials, but the neo4j-importer documentation and PowerShell examples include a plaintext password example (ConvertTo-SecureString "12358lpok" -AsPlainText -Force) and use a neo4j username. That is inconsistent: a component that connects to a database normally requires configurable credentials (env vars or config). Hardcoded passwords in docs/scripts are a security risk and indicate missing, undeclared credential handling.
Persistence & Privilege
The skill does not request always:true and does not declare system-wide config modifications. It reads and writes files under F:\Obsidian and F:\book (expected for a note-taking/import skill). Autonomous invocation is enabled by default (normal), but not combined with high privilege settings in this package.
Scan Findings in Context
[hardcoded-credential-in-doc] unexpected: The neo4j-importer markdown includes a PowerShell credential example with a plaintext password ("12358lpok"). For a Neo4j importer, credentials should be configurable (env vars or secure store); an embedded password in examples or code is disproportionate and risky.
[undeclared-dependencies] expected: The Python scripts require python-docx, PyPDF2 and optional OCR libraries, but the skill metadata has no install spec or declared dependency list. This is expected for instruction-only skills but the lack of declared dependencies increases the chance a user will run code without required packages.
What to consider before installing
What to consider before installing or running this skill:
- Inspect and edit scripts before running: the neo4j importer docs include a plaintext password; search all files (including .py and .md) for any hardcoded credentials and remove them. Replace with environment variables or a secure config file.
- Provide credentials securely: the skill does not declare required env vars. If you use Neo4j, configure the connection (URI, username, password) via environment variables or a secure secret store, not by editing scripts with plaintext secrets.
- Run in a safe environment first: test in an isolated VM or container and point the importer at a disposable/local Neo4j instance. That avoids accidental import into production databases or exposing real data.
- Be aware of filesystem access: the workflow reads from F:\book and writes to F:\Obsidian. Ensure the paths are correct and that sensitive files are not unintentionally processed. Adjust paths in code if you use a different OS or directory layout.
- Install dependencies explicitly: before running, pip-install required packages (python-docx, PyPDF2, etc.). The package does not declare an install step.
- If you want this skill to run autonomously, consider limiting its permissions and confirm database and file access policies. If anything looks unexpected (other hardcoded endpoints, outbound network calls, or requests for unrelated credentials), do not run the skill and ask the author for clarification.
If you want, I can: (1) scan the included Python scripts for any other hardcoded secrets or external endpoints, (2) suggest specific edits to move credentials to env vars, or (3) produce a checklist to safely run this skill in a VM.Like a lobster shell, security has layers — review code before you run it.
latestvk97070pd1a9e3p5pdv584564r583c7kg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
