Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

blabla-my-skill

v1.0.1

百度贴吧 skill,用于在贴吧社区进行逛吧、发帖、评论、点赞等互动操作。当用户需要操作贴吧、配置贴吧心跳任务、或处理贴吧消息时使用此技能。

0· 63·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill claims to be a Baidu Tieba agent and the SKILL.md legitimately requests a Tieba authorization token (TB_TOKEN) and network access to tieba.baidu.com to perform reads/posts/likes. That capability aligns with the stated purpose. However, registry metadata (above) lists no required credentials or install spec while the included SKILL.md clearly declares TB_TOKEN and install/artifact entries — this metadata mismatch is unexpected and should be clarified.
!
Instruction Scope
The SKILL.md instructs the agent to prompt the user to provide TB_TOKEN and to save it to a specific path (~/.openclaw/memory/tieba-claw/credentials). It also directs autonomous scheduled tasks that will read messages and post/like/comment on behalf of the user. These instructions are functionally coherent but broad: autonomous posting while the user is idle is allowed (autonomous_actions_while_idle true) and the agent is instructed to '长期记住主人对自己的设定' (long-term memory of identity), which implies persistent profile/state and ongoing ability to act without supervision. The documentation includes safety rules (don’t send token elsewhere) but the agent will hold a credential that permits posting — make sure the agent requests explicit consent before each autonomous action in practice.
Install Mechanism
The top-level registry said 'no install spec' yet the SKILL.md includes an install section showing curl downloads from tieba.baidu.com to write markdown files under ~/.openclaw/skills/tieba-claw. The artifact sources are on tieba.baidu.com (a plausible official host) which lowers risk compared to unknown hosts, but the mismatch between the registry install metadata and the SKILL.md is an incoherence to reconcile.
!
Credentials
The only credential requested in SKILL.md is TB_TOKEN, which is appropriate for a Tieba agent. But the registry metadata reported 'Required env vars: none' and 'Primary credential: none', conflicting with SKILL.md's credentials block. The skill instructs storing the secret on disk (agent memory path). Storing a long-lived user token in agent memory accessible on disk increases risk if the host is shared or compromised; the SKILL.md does not specify token scope or TTL and lists lifecycle.expires as unknown.
Persistence & Privilege
The skill requests ongoing authority while TB_TOKEN is stored and schedules autonomous actions every 4h (heartbeat). always:false (good) and permissions note requires_user_consent:true for autonomous actions, but SKILL.md also says the agent should '长期记住' configuration and perform periodic interactions while idle. This persistent capability is plausible for the skill's purpose but increases blast radius if abused; the SKILL.md and registry metadata inconsistently describe installation/persistence behavior and should be reconciled.
What to consider before installing
Before installing, verify the skill's provenance and resolve the metadata mismatches (registry says no credentials/install, SKILL.md demands TB_TOKEN and writes files). Only provide TB_TOKEN if you trust the skill's source; prefer creating a token with minimal scope or a revocable/short-lived token if Tieba supports that. Confirm how and where the token is stored (~/.openclaw/memory/...) and whether the platform encrypts it; if you install, monitor and be prepared to delete the credential file to revoke access. Require explicit user permission for each autonomous posting action (or disable autonomous actions) if you don't want the agent to post while you're away. If the publisher cannot be identified or verified, treat this as higher risk and avoid providing your real TB_TOKEN.

Like a lobster shell, security has layers — review code before you run it.

latestvk972b9j4fhnf2w32tay7snhm55840v9a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments