Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Slide Editor

v0.2.0

Visual editor for HTML presentations. Self-contained, offline-capable, designed for AI agent control. HTML 演示文稿可视化编辑器,自包含可离线,支持 AI Agent 控制。

1· 272·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name and description match the included code: a browser-based visual editor and an injector (inject.ts) that embeds a bundle into HTML files. Declared behavior (injecting, enabling, exporting) aligns with the source files and package.json. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md and README clearly instruct the agent/user to build the bundle (bun/esbuild) and run inject.ts to modify HTML files. The injector intentionally reads/writes HTML files, can copy a bundle into the target directory, remove previous injections, and add auto-enable scripts — all within the stated purpose. Note: the injector will modify files on disk and may auto-enable the editor (especially with --open), and the README suggests using window.postMessage with '*' which can be a broader origin target; inspect these behaviors before use.
!
Install Mechanism
There is no formal install spec in registry metadata, but SKILL.md instructs installing bun using a remote install script piped to a shell (curl -fsSL https://bun.sh/install | bash). Running remote scripts directly is higher-risk. The project also lists devDependencies like puppeteer which may download additional binaries (Chromium) during install. The injector itself uses child_process.execSync to run system open commands. These are explainable for a local dev tool but are installation-time risks and should be handled cautiously.
Credentials
The skill requests no environment variables, no credentials, and no config paths. The code does perform file I/O in the directories the user runs it from (reading/writing HTML and copying the bundle), which is consistent with its purpose.
Persistence & Privilege
The skill is not always-enabled and does not alter other skills. It does, however, write to user files (inject script edits HTML and can write editor.bundle.js into the target directory in link mode) and can auto-enable the editor in the page (especially when --open is used). These privileges are expected for an injector but are persistent changes to user files — back up target files before use.
What to consider before installing
This package largely does what it says: it builds an editor bundle and injects it into HTML. However, before installing/running: 1) Do not blindly run the recommended curl | bash installer — prefer an OS/package-manager installation or review the installer script first. 2) Inspect inject.ts and the generated dist/editor.bundle.js to confirm they contain only expected editor code. 3) Back up any HTML files you will inject into (inject.ts overwrites/edits files and can create editor.bundle.js in the target directory). 4) Avoid using --open until you’ve verified the injection; --open opens a file:// URL and the injector can auto-enable the editor without URL parameters. 5) Be aware devDependencies like puppeteer may download extra binaries (Chromium). 6) If you need higher assurance, build and run in an isolated environment (VM/container) or manually copy the bundle into your HTML instead of running the CLI. If you want, I can point out the exact lines in inject.ts and build artifacts to review before running.
inject.ts:179
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

editorvk9765n4wnadg7h4d9a7sdz3sts82x2wqlatestvk971yf8x1grvzx55aw4bs0z25582w7a5presentationvk9765n4wnadg7h4d9a7sdz3sts82x2wqslidesvk9765n4wnadg7h4d9a7sdz3sts82x2wqvisualvk9765n4wnadg7h4d9a7sdz3sts82x2wq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments