Dahua Cloud Open Device Image Analysis
v1.0.5基于大华云开发者平台的 IoT 设备图像分析技能。支持对 Dahua IoT 设备进行抓拍,并调用大模型进行图片分析。可识别监控画面中的人、车辆、物体等,支持安全帽、口罩、烟雾、火焰等检测及摔倒、入侵等行为识别。适用于设备图像分析、安全生产、异常看护、连锁巡检、企业安全管理等场景。
⭐ 0· 144·1 current·1 all-time
byDeveloper@doynkdeveloper
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, SKILL.md, and device_image_analysis.py all describe capturing device snapshots from Dahua Cloud and calling Dahua's imageAnalysis API. Required env vars (ProductId, AK, SK) and use of HMAC signing are appropriate for that purpose.
Instruction Scope
Runtime instructions only cover setting Dahua credentials, invoking the script, capturing images, saving them under captured_images/, and calling Dahua AI endpoints. They do not instruct reading unrelated files, other environment variables, or sending data to unexpected endpoints.
Install Mechanism
No remote downloads or binary installers; dependency is just the well-known Python 'requests' package (requirements.txt and SKILL.md note). Skill is single-file Python using requests, which is proportionate.
Credentials
Only three Dahua-specific credentials are required (ProductId, AK, SK) and the primary credential is the secret key (SK). These are necessary for the documented API flows; no unrelated credentials are requested.
Persistence & Privilege
Skill is not always-enabled, does not require special system-wide privileges, and does not modify other skills or global agent settings. It writes images to a local captured_images/ folder as expected for a snapshot tool.
Assessment
This skill appears to do what it says: capture Dahua IoT device snapshots and call Dahua Cloud imageAnalysis. Before installing, consider: (1) only provide Dahua Cloud credentials created for this application (use least privilege and rotate keys); (2) be aware captured images are saved locally under captured_images/—ensure storage and privacy policies are acceptable; (3) run in a controlled environment or account to limit blast radius if keys are compromised; (4) verify network access to open.cloud-dahua.com is intended in your environment; (5) review and test on non-production devices first. If you need deeper assurance, request provenance (homepage/source) or a signed/reviewed upstream repository for the skill.Like a lobster shell, security has layers — review code before you run it.
latestvk974m8d9c49srnn004cvssrynn83t5te
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
EnvDAHUA_CLOUD_PRODUCT_ID, DAHUA_CLOUD_AK, DAHUA_CLOUD_SK
Primary envDAHUA_CLOUD_SK
