Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Issue Analysis Agent
v1.0.0自动分析客服问题Excel,生成含趋势对比的周报,支持HTML可视化、多图表展示及自动告警并上传公网链接。
⭐ 0· 36·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
技能名与代码、文档和运行说明一致:读取 Excel、统计、生成 HTML 报表并上传到 COS。需要的 Python 库(openpyxl、qcloud_cos、requests)也与功能相符。唯一不一致之处是 registry 元数据声明“无需环境变量/凭据”,但代码依赖 COS 配置。
Instruction Scope
SKILL.md 明确指导运行分析、生成报告并把 HTML 上传到 COS(公网)。运行说明和分步脚本会把本地生成的报表上传到一个远程公共 COS 链接——这意味着任意运行该流程的本地文件能被发送到外部存储。说明没有要求用户明确提供凭据,而代码实际使用内置 config.json/常量的凭据。
Install Mechanism
这是 instruction-plus-scripts 包,没有下载/执行来自不可信 URL 的二进制,依赖用 pip/npm 安装(openpyxl, qcloud_cos, chart.js),安装方式与用途相称,没有高风险的外部二进制下载步骤。
Credentials
注册表声明不需要环境变量/凭据,但 repository 包含 config.json 与 upload_cos.py 内硬编码的 SECRET_ID/SECRET_KEY (看起来像腾讯 COS 凭据)。这既是敏感凭据泄露,也是不一致的设计:技能会向第三方存储上传数据并包含凭据,且没有列出这些为 required.env。硬编码密钥和公开的 bucket/url 放大了数据外传与凭据滥用风险。
Persistence & Privilege
没有设置 always:true,技能不会强制常驻或修改其他技能配置。脚本会在本地创建输出文件和上传到 COS,但没有迹象显示修改系统级配置或其他技能的凭据。
What to consider before installing
What to consider before installing or running this skill:
- Hardcoded cloud credentials: The package includes config.json and upload_cos.py that contain explicit SECRET_ID / SECRET_KEY values and a specific COS bucket (claw-1301484442). This is a serious red flag — the skill will perform network uploads using those credentials. Treat those keys as sensitive (rotate/revoke if they are real) and do not assume they are placeholders.
- Data exfiltration risk: Running the full workflow (weekly_report.py or upload_cos.py) will upload generated HTML reports — potentially containing sensitive customer data — to a public COS URL. If you run this on real data, it will be posted to that external bucket unless you change the target.
- Inconsistency with metadata: The skill metadata lists no required environment variables, but the code relies on embedded credentials. Prefer skills that require the operator to provide their own credentials via environment variables or an explicit configuration step instead of shipping with keys.
- Recommended safe steps before use:
1. Inspect the repository locally and search for SECRET_ID / SECRET_KEY / AKID* strings. Do not run scripts before removing or replacing keys.
2. Replace hardcoded credentials: remove credentials from config.json and upload_cos.py; require the user to supply credentials via environment variables or a secure vault. Ensure the code reads credentials from env vars rather than using defaults.
3. Point uploads to your own cloud account/bucket (and use least privilege keys for upload only), or disable auto-upload entirely until reviewed.
4. Run the analysis components (analyze.py, generate_report.py) in an isolated environment first and keep generated artifacts local until you confirm upload behavior.
5. If the embedded keys are valid, consider them compromised: rotate/revoke them with the owner (if known).
6. If you need to trust this skill, ask the publisher to remove embedded secrets, document credential handling, and require explicit user-provided credentials in SKILL.md/metadata.
- Additional information that would change this assessment: confirmation that the keys in config.json are deliberate placeholders (not valid credentials) and that the skill was updated to require user-supplied credentials (via env vars) or to disable auto-upload by default. If the bucket and keys are intentionally provided for a controlled internal environment and documented, risk is lower but the current packaging is still poor practice.
Bottom line: the skill appears to do what it claims, but the presence of hardcoded cloud credentials and automatic public upload behavior make it suspicious and risky to run on real data without code/configuration changes and credential handling fixes.Like a lobster shell, security has layers — review code before you run it.
latestvk975cce7zxc9hn5d0sg3efb4bh84qpzn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
