Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ppt Task Orchestrator

v1.0.0

Production orchestration for pptx page task extraction and batch image delivery by reusing main-image-editor + psd-automator.

0· 52·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The description promises PPTX→page task orchestration reusing main-image-editor and psd-automator; the code does import and call a main-image-editor task orchestrator which is coherent with the description. However the skill does not declare that it depends on the main-image-editor library nor on npm packages (e.g. jszip) or any external CLI tools — these undeclared dependencies are an inconsistency.
!
Instruction Scope
The SKILL.md and scripts instruct the agent to read arbitrary local PPTX files (absolute or ~ paths), read an index (~/.openclaw/psd-index.json) and write delivery directories and zip files. The parser code also imports child_process.spawnSync (truncated usage visible), implying it may invoke external binaries for OCR/extraction without listing required binaries; this plus the fact that parsed slide text can contain file paths means untrusted PPT content could influence filesystem paths or commands if not carefully sanitized. There are no network-sending steps in the visible code, but local file I/O and external command execution are present and should be reviewed.
!
Install Mechanism
The skill has no install spec even though it includes Node source files that import third-party modules (JSZip) and rely on another library (main-image-editor). Without an install step, required npm packages and the main-image-editor module may not be available at runtime — this is an operational and security inconsistency (missing dependency declaration).
Credentials
The skill requests no environment variables or credentials (none declared). It operates on local file paths provided by the user/request JSON. The lack of credential requests is proportionate to the declared purpose.
Persistence & Privilege
The skill is not always-enabled and does not request system-wide privileges. It writes delivery output and backups as part of its stated function; there is no evidence it modifies other skills' configs or requests persistent elevated privileges.
What to consider before installing
This skill performs local PPTX parsing, may call external tools, and writes/copies files — so: - Do not run it on sensitive systems or with sensitive PPTX files until you review and install its dependencies. - Confirm the environment has the expected Node modules (jszip) and the main-image-editor/psd-automator code the skill imports; their absence will cause runtime errors. - Inspect the remainder of lib/ppt-parser.js (the truncated portion) to see exactly which child_process commands are run (OCR, unzip, etc.). If it invokes external binaries, ensure those binaries are trusted and declared. - Test with a non-sensitive PPTX in a temporary directory and run a dry-run first to observe what files are read and written. - If you require stronger guarantees, ask the author to: (1) declare dependencies and required binaries, (2) provide an install spec or packaging, and (3) document exactly which external commands are executed and how untrusted PPT content is sanitized.
lib/ppt-parser.js:497
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780794qqk6qxzzdqzgfm5yh583kg2b

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments