Back to skill
Skillv1.0.8
ClawScan security
小度控制 · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 18, 2026, 3:53 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- This skill's files, required tools, and runtime instructions are coherent with its stated purpose of controlling 小度 smart screens and IoT devices; nothing in the package requests unrelated credentials or attempts hidden network exfiltration.
- Guidance
- This skill appears coherent: it needs mcporter and an ACCESS_TOKEN to talk to your 小度 MCP servers and uses local scripts to run mcporter calls. Before installing: 1) Treat ACCESS_TOKEN like any sensitive token — give it least privilege and ensure it is stored only in your mcporter config (not pasted into chats). 2) Review ~/.mcporter/mcporter.json to confirm the configured servers and headers. 3) Be aware that the IoT path uses `npx -y dueros-iot-mcp` which will download and run an npm package the first time — if you require tighter supply-chain control, preinstall and vet that package locally. 4) The skill will write device snapshots to a workspace directory (default ~/.openclaw/workspace/xiaodu-control); remove or secure those files if they contain data you don’t want saved. 5) When using resource URLs (images/videos), only provide trusted URLs — the device or MCP may fetch them. If you want extra assurance, run the included test-cases locally (as documented) with a throwaway token or in a controlled environment first.
Review Dimensions
- Purpose & Capability
- okName/description match the actual behavior: scripts and docs all revolve around mcporter-based control of 智能屏 and xiaodu-iot. Required binaries (mcporter, python3, bash, npx) and one env var (ACCESS_TOKEN) are appropriate for connecting to MCP servers and the dueros-iot-mcp stdio server.
- Instruction Scope
- okSKILL.md and scripts confine actions to: probing MCP endpoints, listing devices, resolving device IDs, and issuing mcporter calls for media and IoT control. Scripts reference ~/.mcporter/mcporter.json and a workspace directory for snapshots — expected for this integration. There are no instructions to read unrelated system secrets, exfiltrate logs to external domains, or call unexpected endpoints outside the MCP flow.
- Install Mechanism
- noteThere is no explicit install spec; the skill is distributed as scripts and docs (no packaged binary). The documented use of npx (dueros-iot-mcp) will perform an on-demand npm download at runtime when the IoT stdio server is started; this is expected for the dueros-iot integration but does carry the usual risk of running code fetched from npm. The package otherwise does not download arbitrary archives or use shortened/untrusted URLs.
- Credentials
- okThe only required environment input is ACCESS_TOKEN, which aligns with the MCP authentication model described. The skill legitimately reads mcporter configuration (default ~/.mcporter/mcporter.json) to obtain server definitions; that is expected but means the skill uses whatever tokens or headers are present in the user's mcporter config. No unrelated credentials or high-privilege env vars are requested.
- Persistence & Privilege
- noteThe skill does not request always:true and openai.yaml disables implicit invocation. Scripts write device snapshots to a workspace (default ~/.openclaw/workspace/xiaodu-control) and may create JSON/Markdown there — this is expected for caching and diagnostics but you should be aware device identifiers and statuses will be written to disk. The skill does not modify other skills or system-wide settings.
