Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Baoyu Skills
v1.0.0宝玉分享的 Claude Code 技能集,包含多个内容生成和处理子技能。 子技能列表 (skills/baoyu-*): - baoyu-article-illustrator: 文章插图生成 - baoyu-comic: 漫画生成 - baoyu-compress-image: 图片压缩 - baoyu-co...
⭐ 0· 30·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description (image/markdown/posting skills) align with the code and required runtime (bun + Node + Chrome CDP). Requiring a Chrome profile and image generation API keys is coherent for 'post-to-*' and 'image-gen' features. However the registry summary at the top (saying 'instruction-only', no env vars) is inaccurate: the SKILL.md and many scripts reference environment variables, Chrome profiles, and provider API keys. That mismatch between declared metadata and actual code is unexpected and should be investigated.
Instruction Scope
The SKILL.md and supporting docs instruct running TypeScript scripts via Bun that: read EXTEND.md from project/xdg/home paths, access a shared Chrome CDP profile directory, load browser cookies and access tokens, and call image-generation providers. The url-to-markdown path includes a documented fallback to a hosted 'defuddle.md' API when local capture fails — which means webpage content may be transmitted to an external service. All of those actions go beyond simple 'formatting' and involve reading sensitive local browser state and possibly sending content externally; the runtime instructions also reference env vars (BAOYU_CHROME_PROFILE_DIR, WECHAT_BROWSER_DEBUG_PORT, provider keys) that are not declared in the registry metadata.
Install Mechanism
The SKILL.md frontmatter includes an npm install suggestion (pkg '@jimliu/baoyu-skills', global) and the repository contains a full codebase (many TS files, vendored packages). There is no evidence of remote arbitrary binary downloads or 'curl | bash' installs (the changelog explicitly claims removal of piped installs). Installing via npm is standard; still verify the npm package source and integrity before running globally.
Credentials
Registry metadata lists no required env vars, but the SKILL.md and many scripts reference multiple environment variables and config paths (Chrome profile dir, debug ports, provider API keys). The skill will access a Chrome profile directory to reuse cookies and also contains code to load cookies and get web auth tokens — access that can expose session tokens for other sites. Requesting browser profile access and API keys is explainable for posting and image-generation features, but the declared requirements underreport this surface and the sharing of a single profile for all skills increases risk.
Persistence & Privilege
The skill does not set always:true, but several scripts are designed to use (and recommend) a shared Chrome profile under the user's home directory. That gives the skill access to browser cookies and logged-in sessions. While this is functionally needed for automated posting and web scraping, it's a high-privilege operation: it can read sensitive authentication data and perform actions as the logged-in user. Users should treat that as a meaningful privilege and avoid pointing the skill at their main Chrome profile.
What to consider before installing
This package appears to be a large, genuine toolset for generating and posting content, but it requests and uses sensitive local state that the top-level metadata understates. Before installing: 1) Verify the npm package and upstream repository (is @jimliu/baoyu-skills published and the code there identical to what's shown?). 2) Don't point the tools at your main Chrome profile — create a dedicated Chrome profile directory and set BAOYU_CHROME_PROFILE_DIR to that path. 3) Inspect EXTEND.md / config files to see which API keys and endpoints are required; avoid entering production credentials until you understand how the keys are used. 4) Review or disable the 'defuddle'/hosted fallback behavior if you will be converting pages with sensitive content (it may send page contents to a remote service). 5) If you want to be extra safe, run the skills in a sandbox/container with an isolated profile and limited network access, or install only individual sub-skills you trust rather than the entire bundle. If you want, I can list the exact files that read cookies, reference external endpoints, or expect environment variables so you can audit them more closely.packages/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
packages/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
scripts/install-git-hooks.mjs:10
Shell command execution detected (child_process).
scripts/lib/shared-skill-packages.mjs:68
Shell command execution detected (child_process).
skills/baoyu-compress-image/scripts/main.ts:32
Shell command execution detected (child_process).
skills/baoyu-danger-gemini-web/scripts/gemini-webapi/utils/paths.ts:38
Shell command execution detected (child_process).
skills/baoyu-danger-gemini-web/scripts/vendor/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
skills/baoyu-danger-gemini-web/scripts/vendor/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
skills/baoyu-danger-x-to-markdown/scripts/paths.ts:39
Shell command execution detected (child_process).
skills/baoyu-danger-x-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
skills/baoyu-danger-x-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
skills/baoyu-format-markdown/scripts/autocorrect.ts:6
Shell command execution detected (child_process).
skills/baoyu-image-gen/scripts/providers/google.ts:97
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/cdp.ts:51
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/check-permissions.ts:69
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/copy-to-clipboard.ts:59
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/paste-from-clipboard.ts:54
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/vendor/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/vendor/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/wechat-agent-browser.ts:28
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/wechat-api.ts:332
Shell command execution detected (child_process).
skills/baoyu-post-to-wechat/scripts/wechat-article.ts:96
Shell command execution detected (child_process).
skills/baoyu-post-to-weibo/scripts/copy-to-clipboard.ts:59
Shell command execution detected (child_process).
skills/baoyu-post-to-weibo/scripts/paste-from-clipboard.ts:54
Shell command execution detected (child_process).
skills/baoyu-post-to-weibo/scripts/vendor/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
skills/baoyu-post-to-weibo/scripts/vendor/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
skills/baoyu-post-to-weibo/scripts/weibo-utils.ts:45
Shell command execution detected (child_process).
skills/baoyu-post-to-x/scripts/check-paste-permissions.ts:69
Shell command execution detected (child_process).
skills/baoyu-post-to-x/scripts/copy-to-clipboard.ts:59
Shell command execution detected (child_process).
skills/baoyu-post-to-x/scripts/paste-from-clipboard.ts:54
Shell command execution detected (child_process).
skills/baoyu-post-to-x/scripts/vendor/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
skills/baoyu-post-to-x/scripts/vendor/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
skills/baoyu-post-to-x/scripts/x-utils.ts:76
Shell command execution detected (child_process).
skills/baoyu-url-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.test.ts:89
Shell command execution detected (child_process).
skills/baoyu-url-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.ts:220
Shell command execution detected (child_process).
packages/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
scripts/publish-skill.mjs:40
Environment variable access combined with network send.
scripts/sync-clawhub.mjs:55
Environment variable access combined with network send.
skills/baoyu-danger-gemini-web/scripts/vendor/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
skills/baoyu-danger-x-to-markdown/scripts/graphql.ts:256
Environment variable access combined with network send.
skills/baoyu-danger-x-to-markdown/scripts/http.ts:112
Environment variable access combined with network send.
skills/baoyu-danger-x-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/dashscope.ts:94
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/google.ts:17
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/jimeng.ts:7
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/openai.ts:6
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/openrouter.ts:29
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/replicate.ts:11
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/seedream.test.ts:44
Environment variable access combined with network send.
skills/baoyu-image-gen/scripts/providers/seedream.ts:49
Environment variable access combined with network send.
skills/baoyu-post-to-wechat/scripts/vendor/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
skills/baoyu-post-to-weibo/scripts/vendor/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
skills/baoyu-post-to-x/scripts/vendor/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
skills/baoyu-url-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.ts:97
Environment variable access combined with network send.
packages/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
scripts/publish-skill.mjs:21
File read combined with network send (possible exfiltration).
scripts/sync-clawhub.mjs:262
File read combined with network send (possible exfiltration).
skills/baoyu-danger-gemini-web/scripts/gemini-webapi/utils/upload-file.ts:3
File read combined with network send (possible exfiltration).
skills/baoyu-danger-gemini-web/scripts/vendor/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
skills/baoyu-danger-x-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
skills/baoyu-image-gen/scripts/providers/google.ts:2
File read combined with network send (possible exfiltration).
skills/baoyu-image-gen/scripts/providers/openai.ts:2
File read combined with network send (possible exfiltration).
skills/baoyu-image-gen/scripts/providers/openrouter.ts:2
File read combined with network send (possible exfiltration).
skills/baoyu-image-gen/scripts/providers/replicate.ts:2
File read combined with network send (possible exfiltration).
skills/baoyu-image-gen/scripts/providers/seedream.ts:2
File read combined with network send (possible exfiltration).
skills/baoyu-post-to-wechat/scripts/vendor/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
skills/baoyu-post-to-wechat/scripts/wechat-api.ts:109
File read combined with network send (possible exfiltration).
skills/baoyu-post-to-weibo/scripts/vendor/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
skills/baoyu-post-to-x/scripts/vendor/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
skills/baoyu-url-to-markdown/scripts/vendor/baoyu-chrome-cdp/src/index.ts:202
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97cd9678rk6y5p6yc0evs2vvx84artn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎨 Clawdis
Binsbun
