Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cosdesign Standalone

v1.0.0

设计风格精准复刻工具 — 通过 Jina Reader / WebFetch / WebSearch 浏览目标网页, 自动提取色彩体系、字体排版、间距系统、布局结构、组件风格,输出可执行的设计规范文档。 支持单页分析、多站对比、风格定义输出(Design Token / CSS Variable / Tailwi...

0· 65·0 current·0 all-time
byCosmos Fang@cosmofang
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (extract design tokens from webpages) matches the code: the JS files are prompt generators that instruct an agent to fetch pages and extract design parameters. This is coherent. Minor mismatch: the SKILL.md claims the tool will not download fonts or images but some export instructions (HTML report / 'use the site's actual fonts') encourage using site fonts, which could require fetching font files — that contradicts the 'no-download' statement.
!
Instruction Scope
All scripts are prompt generators that instruct the agent to use external fetch tools (WebFetch and r.jina.ai) to retrieve full page CSS and computed styles. The scripts themselves do not perform network calls, but the generated prompts will cause the agent/platform to fetch arbitrary URLs and send page content to the LLM/tooling. The skill's docs assert it won't process login-protected pages or store credentials, but nothing in the scripts enforces that — if you run it against private/authenticated URLs you may end up sending private page content to external services.
Install Mechanism
No install spec (instruction-only plus small scripts). There is no download-from-URL or package installation. Risk from install mechanism is low.
Credentials
No required credentials declared; JINA_API_KEY is optional in metadata only (reasonable for using Jina Reader). The scripts do not read other environment variables or require secrets.
Persistence & Privilege
SKILL.md states analysis history will be appended to data/analysis-history.json after each run, and the repository includes an empty data/analysis-history.json file. However, the bundled scripts are prompt generators and do not themselves write to that file. This is an inconsistency: the skill's documentation promises persistent history but the provided code does not implement it. The skill does not request elevated privileges and always:false.
What to consider before installing
Plain-language considerations before installing or running this skill: - What it actually does: the packaged JS files only print structured prompts; the actual webpage fetching and extraction will be performed by your agent/platform (WebFetch or Jina Reader). The skill delegates network access to the platform tools, it does not fetch sites itself. - Privacy risk: when you ask it to analyze a URL, the full page content (HTML/CSS/computed styles) will be sent to the model/tooling and possibly to third-party fetch services (r.jina.ai). Do not use this on private, behind-login, or sensitive pages unless you understand where that data will be sent and stored. - Inconsistencies to note: the README claims 'no downloading of fonts/images' but the export/html-report template asks to 'use the site's actual fonts' (which may imply fetching fonts). Also the README claims analysis history is appended to data/analysis-history.json, but the provided scripts do not write to that file — so persistence behavior is unclear. - Credentials: JINA_API_KEY is optional. Only provide it if you trust Jina Reader and need higher crawl throughput. - Mitigations: review or run the scripts locally in a sandbox; avoid feeding private/authenticated URLs; inspect any output before sharing it externally; if you don't want any persistence, remove or clear data/analysis-history.json and run the scripts manually to confirm they do not write files; if you require stricter guarantees, ask the author for a version that explicitly avoids any external fetch services or that documents exactly which services are contacted and what data is transmitted.

Like a lobster shell, security has layers — review code before you run it.

latestvk9724pnbd5g2hs8ttrvfb4gtqs84j0vr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Environment variables
JINA_API_KEYoptionalJina Reader API key for enhanced crawling. Free tier works without key.

Comments