Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

read-gbk

v1.0.0

读取本地文本文件,支持 GBK/UTF-8 编码自动检测

0· 158·0 current·0 all-time
by张辰菁@delicate314
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included JS wrapper and Python reader. Requiring a Python binary is reasonable because the implementation calls a Python script to perform encoding detection and .docx/.pdf handling.
Instruction Scope
SKILL.md tells the agent to run the provided node script which invokes the bundled Python script. The runtime instructions and code only read a user-specified local file and optionally install helper libraries; they do not attempt to read unrelated system files, export credentials, or post file contents to external endpoints.
Install Mechanism
There is no install spec, but the Python code will auto-install python-docx and pypdf via pip on first use (subprocess.run calling pip). This downloads packages from PyPI at runtime and does not pin versions. This is expected for .docx/.pdf support but increases runtime network activity and can modify the user's Python environment.
Credentials
The skill requests no credentials or config paths. The JS wrapper reads process.env (and USERNAME to compose common Python paths) only to locate Python; the Python script uses sys.executable for pip. No secret-bearing environment variables are required or accessed.
Persistence & Privilege
always:false and no cross-skill configuration changes. However, the skill may alter the host Python environment by installing packages (python-docx/pypdf) into the active interpreter/site-packages; this is a persistent side-effect outside the skill's own files.
Assessment
This skill appears to do what it says: read local files with GBK/UTF-8 detection. Before installing/using it, consider: 1) The tool will attempt to run pip to install python-docx or pypdf from PyPI when reading .docx/.pdf — this requires network access and will modify your Python environment (use a virtualenv/conda env if you want to avoid global installs). 2) Package installs are unpinned (no fixed versions), so behavior can change over time; review/approve network installs if policy requires. 3) The skill reads arbitrary local file paths you provide — avoid pointing it at sensitive files unless you trust the environment. 4) If you need stricter isolation, run the scripts in a sandbox or inspect/execute the Python script manually. Overall the skill is internally consistent, but be mindful of the runtime pip installs and run in an isolated Python environment if that matters to you.
scripts/read-file.js:27
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk974b3sqxsyqnm1mrw2p67rmhh834k77

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📄 Clawdis
Binspython

Comments