Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Viz Table
v1.0.0从 CSV/JSON 文件读取数据,使用 ECharts 生成可视化 HTML 图表(柱状图、折线图、饼图、环形图)并自动在浏览器中打开。用户提供文件路径时触发。
⭐ 0· 127·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (visualize CSV/JSON with ECharts) matches the instructions: read a file, parse CSV/JSON, build ECharts options, write an HTML, and open it. No unrelated credentials, binaries, or installs are requested.
Instruction Scope
Instructions tell the agent to inline raw file data into an HTML page and to implement a client-side formula editor that performs string replacement and uses eval(). The SKILL.md does not require or describe output sanitization or escaping, which enables DOM/script injection when input files contain malicious content. It also hard-codes a platform-specific shell command (`open /tmp/...`) without fallback.
Install Mechanism
Instruction-only skill with no install — low risk for on-disk installs. However, the generated HTML loads ECharts from an external CDN (jsdelivr.net), which is a supply-chain/network dependency the skill will pull at runtime in the user's browser.
Credentials
No environment variables, credentials, or config paths are requested — this is proportional to the described task.
Persistence & Privilege
Skill is not always-enabled and does not request elevated platform privileges or modify other skills. It writes a single file to /tmp (temporary location) and opens it, which is normal for this use case.
What to consider before installing
This skill appears to do what it says, but it includes risky runtime behaviors you should consider before installing or using it:
- Client-side use of eval(): The SKILL.md instructs the page to compute user-entered formulas via eval(), which can execute arbitrary JavaScript. Replace eval() with a safe expression evaluator (e.g., mathjs) or strictly validate/parse formulas before execution.
- Unsanitized data injection / XSS risk: The generated HTML will render the input CSV/JSON into the page. If the implementation inserts data using innerHTML or otherwise fails to escape/encode content, a CSV containing <script> or crafted strings could run code in your browser. Ensure all cell values are escaped (use textContent or proper escaping) and avoid injecting raw HTML.
- Remote CDN dependency: The page loads ECharts from jsdelivr.net. That is convenient but introduces a remote network dependency and supply-chain risk. Consider bundling a vetted ECharts build or allowing an offline/local alternative.
- Platform-specific open command: The SKILL.md runs `open /tmp/viz-table-output.html` (macOS). On Linux/Windows this will fail or be inappropriate; the skill should detect platform or use a safer approach (spawn default browser via platform API or instruct the user to open the file). Also consider asking for confirmation before automatically opening files.
- Limit data sensitivity: Because the skill reads arbitrary file paths and writes and opens a local HTML that references remote resources, avoid using it on sensitive data unless you review and sanitize the generated HTML.
If you want to proceed, ask the author (or modify the implementation) to: use a safe formula parser, explicitly escape all table data, provide cross-platform open behavior or prompt the user, and make loading of external scripts optional or local. If you cannot verify those changes, treat outputs as potentially unsafe and do not open with sensitive datasets.Like a lobster shell, security has layers — review code before you run it.
latestvk9700n3vexkeem1cdvcmaynbwn83m5x8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
