Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

技术宣发助手

v1.0.0

AI技术报告社媒宣发一键生成器。输入PDF技术报告,一键生成X推文Thread、 小红书帖子(好物推荐+技术揭秘两种风格)、微信公众号文章(量子位风格), 可选AI配图生成。用法: /宣传 <pdf路径> [--platform x|xhs|wechat|all] [--no-image]

0· 77·0 current·0 all-time
byChristiana@christianashannon
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's stated purpose (generate social-media copy and optional images from a PDF) matches the included templates and scripts. Image-generation code and prompts are coherent with the 'optional AI images' feature. However, the skill metadata declares no required environment variables or credentials while both the SKILL.md and generate_image.py clearly expect ARK_API_KEY, REPLICATE_API_TOKEN or OPENAI_API_KEY — an inconsistency between declared requirements and actual runtime needs.
!
Instruction Scope
Runtime instructions direct the agent to read arbitrary PDF files from the provided path, extract full text/images, build image prompts from that content, and (if keys available) POST those prompts to external image APIs. There is no mention of redaction, opt-in for uploading potentially sensitive content, or limiting which extracted content is sent to providers. That creates a real data‑exfiltration/privacy risk for confidential PDFs.
Install Mechanism
No formal install spec is provided (instruction-only), but SKILL.md instructs runtime pip installs via scripts/requirements.txt if pdf parsing libs are missing. Installing third‑party packages at runtime in the agent environment increases attack surface and may modify the runtime environment unexpectedly (requests, pdfplumber, PyMuPDF, Pillow). The pip source is the local requirements file (not an arbitrary remote URL), which is lower risk than fetching arbitrary archives, but still noteworthy.
!
Credentials
The code and SKILL.md check for and use ARK_API_KEY, REPLICATE_API_TOKEN, and OPENAI_API_KEY, yet the skill declares no required env vars/primary credential. Requiring image-provider API keys is proportionate for optional image generation, but omitting them from metadata is misleading. More importantly, those keys (if provided) will cause the skill to transmit prompts derived from the user's PDF to external services — a credential + data‑exfiltration combination that should be explicit to the installer.
Persistence & Privilege
The skill is not always-enabled and disable-model-invocation is set true (user-invocable only). It does not request system-wide config changes or modify other skills. File reads/writes are limited to user-specified PDF paths and local ./output directories as described.
What to consider before installing
This skill largely does what it claims but has two practical risks you should consider before installing: - Undeclared image API keys: The code will look for ARK_API_KEY, REPLICATE_API_TOKEN, and OPENAI_API_KEY and, if present, will send generated image prompts (which may include text derived from your PDF) to those third-party services. The skill metadata does not declare these env vars — treat any API key you set as allowing the skill to communicate with external providers. - Potential data leakage: If you run image generation (or forget to use --no-image), portions of the PDF content may be incorporated into prompts and uploaded. Do not use this skill with confidential or proprietary PDFs unless you review/strip sensitive content first. - Runtime pip installs: The skill will attempt to install pdfplumber, PyMuPDF, requests, Pillow, etc., at runtime if missing. Consider running in a sandboxed environment or pre-installing these packages yourself. Recommendations: - If you only need copy generation, run with --no-image (or ensure no image API keys are set) so nothing is sent to external image endpoints. - Inspect scripts/extract_pdf.py and generate_image.py locally and consider running them manually in a controlled environment first. - If you must enable image generation, avoid supplying production API keys; use limited-scope/test keys and review the generated image_specs.json before any automatic upload. - If handling sensitive documents, do not enable stage 4 (image generation) and consider sanitizing the PDF before use. If you want, I can list the exact lines where env vars and external endpoints are referenced and suggest small code edits (e.g., explicit confirmation prompt before any network call, or redaction options) to reduce the risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk9724qs08hrp13pmv1vec6sfyd84j2np

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments