Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Wechat Article Auto Gen

v1.0.0

自动抓取和改写公众号文章,生成分镜、AI 配图和封面,输出符合 MUX 品牌风格的完整 HTML 图文内容。

0· 45·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The described purpose (scraping WeChat articles, rewriting to MUX brand, generating AI images, building HTML) aligns with the actions shown in SKILL.md. However, the SKILL.md references additional code files (config.py, scraper.py, rewriter.py, etc.) that are not present in the package manifest, which is inconsistent and reduces provenance. Also the document embeds a literal API key/URL for a third-party image service instead of declaring credentials or requiring the user to provide them.
!
Instruction Scope
Instructions explicitly tell the agent to scrape external article URLs, send content to an LLM-based rewrite step, call a third-party image-generation API, write image files, open/save fonts and images, and embed images as Base64 in HTML. Scraping arbitrary URLs and sending article content to external services can expose potentially sensitive or copyrighted content. The SKILL.md contains concrete network endpoints and a hardcoded API key, meaning runtime will involve external network calls beyond the local agent.
Install Mechanism
There is no install spec and no code files bundled (instruction-only). That lowers direct install risk because nothing is written or executed by an installer. The risk comes from runtime network calls and file I/O described in SKILL.md rather than from an install mechanism.
!
Credentials
The skill declares no required environment variables or credentials, yet the document includes a hard-coded API key ('565ec265-1b1e-4fa4-bcd8-c3d37c6a6198') and an explicit API URL for image generation. This is inconsistent: either the key is a placeholder or it's a leaked/embedded credential. No guidance is given for replacing this with the user's own credential, and no other credentials (e.g., for scraping protected content or for LLM APIs) are declared.
Persistence & Privilege
The skill is not marked always:true and does not request elevated or persistent platform privileges. It does instruct writing image and HTML files to disk, which is a normal behavior for content-generation tools and is scoped to the skill's outputs.
What to consider before installing
This skill largely does what its description promises, but there are several red flags you should consider before installing or using it: - Hard-coded API key: SKILL.md contains a literal API key and API URL for a third‑party image service. Treat this as suspicious — it may be a placeholder, a leaked key, or an invitation to use someone else's quota. Do not rely on embedded keys; require the author to remove it and document how to supply your own credential via environment variables or config. - Missing code provenance: The documentation mentions multiple code files (scraper.py, rewriter.py, etc.) but the package contains only SKILL.md and _meta.json. Ask the publisher for the full source or provenance before trusting runtime behavior. - Network and data exfiltration risk: At runtime the skill will fetch arbitrary web articles and send content to external services (image generation API, potentially LLM endpoints). That can leak copyrighted or sensitive contents. Verify legal compliance for scraping target sites and ensure you control which external endpoints are used. - Replace hard-coded secrets and review endpoints: If you plan to run this, replace any embedded keys with your own credentials, whitelist allowed external hosts, and run the skill in a network-restricted/sandboxed environment until you can confirm behavior. - Ask for clarifications: Request the missing code files, a clear list of all external endpoints the skill calls, and explicit instructions on how to supply credentials. If the author cannot provide these, treat the skill as untrusted. If you must test it: run in an isolated environment, monitor outbound network traffic, and do not use sensitive or production credentials until you've verified the code and provenance.

Like a lobster shell, security has layers — review code before you run it.

latestvk973658w1m4hvwb9pys2926kb183k8n7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments