Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

geeknews-bot

v1.0.0

매일 GeekNews(news.hada.io)에서 오늘의 HOT 이슈 5개를 큐레이션하고, 오픈소스 출시·GitHub star 급상승 프로젝트를 우선 선정하여 텔레그램으로 전송하는 데일리 브리프 에이전트 스킬. 사용자가 "긱뉴스 요약", "오늘 개발 뉴스", "OSS 뉴스", "텔...

0· 52·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The declared purpose (curate GeekNews and send Telegram briefs) matches the provided code (send_telegram.py, run_geeknews_brief.sh) and references. However the registry metadata claims no required environment variables, while the SKILL.md and scripts clearly require TELEGRAM_BOT_TOKEN and TELEGRAM_CHAT_ID and the cron script requires ANTHROPIC_API_KEY (and optionally GITHUB_TOKEN). The missing env var declarations in metadata are a mismatch and reduce transparency.
!
Instruction Scope
SKILL.md describes collecting data via RSS and web scraping (with clear fallback rules). The actual run_geeknews_brief.sh script, however, does not implement scraping or RSS parsing — it delegates to the Anthropic API (claude) when ANTHROPIC_API_KEY is present and otherwise exits with an instruction to implement scraping manually. That is an instruction/implementation mismatch: the user-facing doc promises local collection options but the shipped automation relies on an external LLM/web_search tool. The agent will also send the high-level prompt to Anthropic which requests checking the main page; this causes remote network access to news.hada.io via the model/tool and may transmit contextual data to the external LLM provider.
Install Mechanism
No install script or remote download is present; the skill is instruction-first with two small scripts and a reference doc. This is low-risk from an install mechanism perspective because nothing arbitrary is fetched or extracted at install time.
!
Credentials
The skill requires TELEGRAM_BOT_TOKEN and TELEGRAM_CHAT_ID to function and the cron script requires ANTHROPIC_API_KEY to run the pipeline — but the declared registry metadata lists no required env vars. The script also recommends GITHUB_TOKEN to avoid GitHub API rate limits. Requiring an LLM API key (Anthropic) is a reasonable design choice if the pipeline deliberately uses that service, but it must be declared up front. The omission is disproportionate to the manifest and could mislead users into installing without realizing required credentials will be used remotely.
Persistence & Privilege
always is false and the skill does not request or attempt to modify other skills or system-wide agent settings. It writes a temporary markdown file (/tmp/geeknews_brief_YYYYMMDD.md) and checks environment variables; this is normal for a cron-driven script and does not request elevated persistence.
What to consider before installing
Things to consider before installing or running this skill: - Required credentials are not declared in the registry metadata. The runtime needs TELEGRAM_BOT_TOKEN and TELEGRAM_CHAT_ID (mandatory) and the run script requires ANTHROPIC_API_KEY (it will exit if missing). It also recommends GITHUB_TOKEN to avoid rate limits. Don't run the cron script unless you intend the pipeline to call Anthropic. - Implementation mismatch: SKILL.md describes scraping/RSS fallback, but the provided automation delegates to Anthropic's API (claude) with a web_search tool. If you prefer local scraping (so content never leaves your host), you'll need to implement that yourself or modify run_geeknews_brief.sh. Running as-is will transmit prompts and rely on Anthropic; evaluate whether that data flow (site URLs and prompt content) is acceptable. - Network endpoints used: api.anthropic.com (if ANTHROPIC_API_KEY set) and api.telegram.org. The Telegram bot token must be protected; any compromise of that token would allow message sends as your bot. Keep tokens in a secure place and avoid committing them to repo. - Review message contents: the script sends the full generated markdown via send_telegram.py. Ensure no sensitive information is included in the generated brief or prompt context (the prompt instructs the model to "check the main page" — the model/tool may retrieve and process site content). - Actionable steps: ask the publisher to update registry metadata to list required env vars; if you don't trust remote LLM calls, modify the pipeline to perform local RSS parsing/scraping and GitHub queries yourself; store tokens in a secure secret store; test send_telegram.py manually with a test bot/chat before enabling cron. Overall, the skill is not evidently malicious but has clear inconsistencies and a surprising dependency on an external LLM for the automated pipeline — treat it cautiously and correct the manifest and/or implementation before enabling automated runs.

Like a lobster shell, security has layers — review code before you run it.

latestvk9739z7a2n36xp2gdtr5gygjc1843sh0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments