Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Han Jr System
v1.0.0小翰系统:1688平台自动化供应商联系系统。使用场景:用户需要联系1688供应商、发送询价消息、收集报价时。触发于如联系1688铅笔供应商、搜索dgx spark供应商等任务。严格遵守逐家联系、验证优先、准确性优先原则。
⭐ 0· 175·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description (automating contact on 1688) matches the provided scripts and SKILL.md: many scripts implement searching, opening offer pages, opening WangWang chat frames, sending messages, OCR verification, and a slider captcha solver. Required artifacts (Playwright, Chromium connection) align with the stated automation purpose.
Instruction Scope
SKILL.md instructs the agent to start Chrome with --remote-debugging-port=9222 and run the included Python scripts to enumerate tabs, navigate 1688, screenshot pages, OCR, and send messages. That scope is consistent with automating supplier contact. However the instructions explicitly teach and automate anti‑bot/captcha bypass (slider_captcha.py) and ask the agent to connect to an existing browser context (giving access to all open tabs, cookies, sessions). This expands the data surface beyond only 1688 pages (e.g., any logged-in sessions in that browser become accessible).
Install Mechanism
There is no remote install spec; SKILL.md recommends pip installing standard Python libraries (playwright, requests, beautifulsoup4, easyocr, pillow, numpy) and running playwright install chromium. No downloads from unknown hosts or archive extraction are present in metadata. The dependency list is reasonable for a Playwright-based automation tool.
Credentials
The skill requests no explicit environment variables, but runtime instructions require connecting to Chrome's remote debugging endpoint (http://localhost:9222). That connection grants the scripts programmatic access to all browser contexts, tabs, DOMs, cookies, and potentially authentication sessions for any site open in that browser — a high-privilege capability. While this is necessary for the stated automation, it is powerful and not declared as a formal required config in the metadata; users should be aware of the breadth of access granted.
Persistence & Privilege
always is false and the skill does not declare system-wide installs or modifications. The agent may be invoked autonomously (platform default). Combined with the scripts' ability to control a local browser, autonomous invocation increases risk (the skill could run automation without manual oversight). There is no install-time step that writes to other skills' configs.
What to consider before installing
This skill is internally consistent with its stated purpose (automating search and messaging on 1688) but contains behaviors you should treat carefully:
1) High-privilege browser access: It requires starting Chrome with remote debugging and connects to http://localhost:9222. That gives the scripts access to all open tabs, cookies and logged-in sessions in that browser. Run it only against a dedicated browser/profile or in an isolated VM/container, never on a browser with other sensitive accounts logged in.
2) Captcha bypassing: The package includes an automated slider captcha solver. Using automated captcha bypass may violate 1688's terms of service and could cause account suspension or legal/ethical issues. Consider the compliance implications before using.
3) Audit network/exfiltration: Although the reviewed code appears to act locally (browser automation, OCR, saving JSON and screenshots), you should still grep the repository for network calls (requests.post/get, urllib requests, sockets) or hardcoded remote endpoints to ensure no unexpected data exfiltration. Pay special attention to any 'requests' usage or external URLs in scripts not shown in snippets.
4) Test in isolation: If you want to try the skill, run it in an isolated environment (VM or disposable container), with a fresh Chrome profile created only for this automation, and monitor network and file writes. Review slider_captcha.py and any file that calls 'requests' or writes logs to verify no sensitive data is transmitted off-host.
5) Operational risks: Automated messaging at scale can trigger anti-abuse systems and cause account bans. The scripts implement rate limiting and 'first/double check' behavior, but you remain responsible for usage policy compliance.
If you want, I can:
- highlight any occurrences of network calls or suspicious strings across the full codebase,
- summarize where cookies/sessions are accessed, or
- suggest a minimal safe test plan and how to sandbox execution.Like a lobster shell, security has layers — review code before you run it.
latestvk974qgpd987kj9wz309az1gx8h832ptk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
