Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
一个功能强大的屏幕浏览、OCR识别和屏幕分析技能包,专为AI助手设计
v1.0.0此技能应被用于任何需要捕获屏幕截图、分析屏幕内容或处理屏幕图像的任务。包括:使用Python PIL库捕获整个屏幕或特定区域的截图;保存截图到指定位置;分析截图中的文字内容(支持中英文OCR识别);对截图进行基本图像处理(裁剪、旋转、调整大小)。当用户提到"屏幕截图"、"截屏"、"查看屏幕"或需要分析屏幕上的内容...
⭐ 0· 501·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description, SKILL.md, README and included scripts consistently implement screen capture, OCR and basic image analysis. Requested Python libraries (Pillow, pyautogui, pytesseract, OpenCV, numpy) and reference to Tesseract OCR are appropriate and expected for the described functionality.
Instruction Scope
SKILL.md instructs the agent to run local Python scripts to capture the screen, save images, and perform OCR/analysis — these are within scope. However the runtime instructions also call out a one‑click installer (python scripts/setup.py) and an install script that will download and run a Tesseract installer; these steps cause network activity and execution of an external binary beyond simple local script execution.
Install Mechanism
There is no platform install spec in the package manifest, but scripts/install_tesseract.py programmatically downloads a Windows installer EXE (primary URL: digi.bib.uni-mannheim.de, fallback to a GitHub releases download URL) and runs it silently. Downloading and executing an external installer is a high-risk action — even if the URLs appear related to UB‑Mannheim Tesseract builds, it requires the user to trust external binaries and grants the script the ability to run privileged installers on the host.
Credentials
The skill does not request environment variables, credentials, or config paths unrelated to its purpose. Dependency checks inspect common Program Files paths and call tesseract commands; this is proportional to locating a locally installed Tesseract binary. No secrets or unrelated tokens are requested.
Persistence & Privilege
Skill flags show no forced persistence (always: false) and normal autonomous invocation is allowed. The only persistent effect the package may request is installing Tesseract system‑wide (writes to Program Files), which requires administrative privileges on Windows. The skill does not modify other skills or system agent configs.
What to consider before installing
This package appears to do what it says: take screenshots and run OCR/analysis. Before installing or running it, consider the following:
- Screenshots capture all visible data on your screen (including passwords, 2FA codes, private messages). Only run these scripts in a trusted environment and be mindful of privacy of captured images and output files.
- The Windows installer script (scripts/install_tesseract.py) downloads a .exe from the network and executes it with silent install flags. Verify the download URLs and, if possible, the file checksum/signature before running. Prefer to install Tesseract manually from the official project or your distribution's package manager if you are uncomfortable with automated installers.
- Inspect scripts/install_tesseract.py and scripts/setup.py (and any other scripts) before running them to ensure there is no unwanted network behavior or commands. Consider running the package in a disposable VM/container first.
- The package does not request credentials, but it will write files (images, text, JSON) to the working directory. Review where output is stored and ensure sensitive captures are handled securely.
- If you plan to allow an agent to invoke this skill autonomously, restrict autonomous execution or monitor runs; automated screenshotting has high privacy impact. Disable or limit autonomous invocation if you cannot review each action.
- Good checks to perform: run scripts/dependency_check.py to see what is missing, run the examples in a safe environment, and prefer manual installation of Tesseract (brew/apt or official Windows installer you obtained yourself).Like a lobster shell, security has layers — review code before you run it.
latestvk9737mnv1tvx3zrh52tmvzgc5s82ybre
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
