Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Music Analysis
v1.0.0Analyze music/audio files locally without external APIs. Extract tempo, pocket/groove feel, pulse stability, swing proxy, section/repetition structure, key c...
⭐ 0· 38·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (local music/audio analysis) matches the code: Python scripts use librosa, numpy, ffmpeg/ffprobe and optionally Whisper for transcription. That is coherent. Notes of concern: the setup.sh uses a hard-coded SKILL_DIR (/Users/huang/.openclaw/workspace/skills/music-analysis) and writes aliases to ~/.zshrc; those filesystem targets are specific and not declared in metadata. The SKILL.md suggests using yt-dlp for sourcing audio (external downloads) though yt-dlp is not installed by the skill — this is reasonable but should be explicit.
Instruction Scope
SKILL.md and scripts operate on local audio files and call ffmpeg/ffprobe and an optional whisper-cli; they do not contain code that exfiltrates analysis to external endpoints. Whisper usage and a model file are expected to be local; however SKILL.md and setup.sh instruct downloading large model binaries and suggest using yt-dlp to fetch YouTube audio (network actions). The scripts also modify/inspect user files (via setup.sh) and create temp files. No instructions ask for unrelated system credentials or to read arbitrary unrelated files, but the install script modifies shell config.
Install Mechanism
There is no registry install spec, but an included setup.sh performs actions: creates a venv, pip installs packages from PyPI, and curl-downloads a ~1.5GB Whisper binary from huggingface.co (a well-known host). Downloading a large prebuilt model is higher-risk than pure pip installs but the URL points to an expected Whisper/C++ model. The script expects brew-managed whisper-cli/ffmpeg or instructs how to install them. No obfuscated or shortener URLs found.
Credentials
The skill does not request environment variables or credentials. It does rely on certain filesystem locations (WHISPER model under ~/.local/share/whisper-cpp and the hard-coded SKILL_DIR) and presence of ffmpeg/whisper-cli. Because it writes aliases to ~/.zshrc and assumes a specific /Users/huang path, the requested filesystem access is broader than strictly necessary for a generic, relocatable skill.
Persistence & Privilege
The skill is not force-enabled (always: false), but setup.sh modifies the user's ~/.zshrc to add aliases and creates a venv at a hard-coded path. Those actions change the user's shell environment and drop files into the home/workspace; they increase persistence and have side effects beyond simply running analysis. This is legitimate for a local developer convenience script but should be flagged to users who expect non-invasive install behavior.
What to consider before installing
This skill appears to implement the advertised local audio analysis (librosa-based features, temporal analysis, optional Whisper transcription). However: 1) Inspect setup.sh before running — it will create a virtualenv, pip install packages, download a ~1.5GB Whisper model from huggingface.co, and append aliases to ~/.zshrc; the script uses a hard-coded SKILL_DIR (/Users/huang/...), so it will likely fail or write unexpected files on your machine unless you edit it. 2) If you don't want the aliases or files in your home, do not run setup.sh as-is; instead create a venv manually, pip install requirements.txt, and run the scripts from a controlled directory. 3) The tool invokes ffmpeg/ffprobe and whisper-cli (optional); ensure you trust these binaries and verify their provenance. 4) The skill does not request credentials, nor does it clearly exfiltrate data, but it does perform network downloads during setup (model binary) and suggests using yt-dlp for audio sourcing. Recommendation: treat the package as useful but potentially intrusive — run it in a dedicated environment or container, review and adapt setup.sh (remove or fix hard-coded paths and ~/.zshrc modifications), and verify external downloads before executing them.Like a lobster shell, security has layers — review code before you run it.
latestvk97d8q2efhw1rf39ap4800eqf5844ps1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
