Back to skill
Skillv1.0.8

ClawScan security

Taobao Merchant Ops · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 29, 2026, 3:23 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The package matches its stated Taobao automation purpose, but it performs remote license activation to a hard-coded IP address and persists browser login state (cookies) locally — both are sensitive actions you should review before installing or running.
Guidance
This skill is largely coherent with its stated purpose, but it has some sensitive behaviors you should consider before installing: 1) License activation: the program POSTs your card key and a machine fingerprint to a remote license server. The default server is a raw IP (http://120.27.202.105:8000). If you don't trust that endpoint, do not enter card keys or use the tool until you verify the server's identity. You can override the server via TMO_LICENSE_SERVER, but only if you know a safe endpoint. 2) Browser login state: the RPA reuses and writes a storage_state file that contains authentication cookies—treat that file as highly sensitive (it can grant account access). 3) Bundled get-pip.py: the repo includes a huge pip bootstrap blob; while likely legitimate, bundling increases audit surface—inspect it if provenance matters. Recommended precautions: run the tool in an isolated VM or disposable container; review license_gate.py and confirm the activation endpoint before entering secrets; avoid reusing production account logins (use a test account) or delete saved storage state after use; inspect network activity (e.g., via a firewall) during first runs; contact the seller/source for a verifiable homepage or signed releases before trusting real credentials. If you want, I can point out the exact lines that perform remote activation, where files are written, and what data is sent.

Review Dimensions

Purpose & Capability
noteName/description (Taobao merchant ops) align with the included files: Playwright-based RPA, Excel parsing, install script and a license gate. The code implements the claimed features (capture/inspection/parse). Nothing in the codebase appears obviously unrelated to merchant automation.
Instruction Scope
noteSKILL.md tells users to run the provided install.py and run_taobao_merchant_ops.py with a card-key. The runtime instructions do not overreach (they instruct installation and running). However, the runtime code (license_gate) performs network calls for activation/check and the RPA saves browser storage (login state) and diagnostics — these behaviors are not emphasized in the user-facing SKILL.md and are sensitive.
Install Mechanism
noteThere is no registry install spec (instruction-only), which lowers remote-install risk. The package includes an embedded get-pip.py (a large bundled pip bootstrap blob). Bundling get-pip.py is unusual but can be legitimate; it increases repository size and should be inspected if you care about provenance.
Credentials
concernThe code transmits a machine fingerprint and user-provided card key to a remote license server. The default LICENSE_SERVER_URL is an IP (http://120.27.202.105:8000), not a well-known domain; activation and subsequent license checks use HTTP POSTs. The skill will also write saved browser login/state files (yingdao_storage_state.json) and diagnostics that include python_executable and platform info. These are reasonable for a paid RPA tool but are sensitive and not declared explicitly in requires.env; consider that card keys and login cookies are sent or stored.
Persistence & Privilege
notealways is false and the skill does not request elevated platform privileges. It persists its own files: license/license.json, yingdao_storage_state.json (browser login state), downloads, run_logs and diagnostics under the project. Persisting login cookies and license files is normal for this app but raises privacy concerns if you run it with real credentials.