Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
deerflow-install-master
v1.0.0DeerFlow 2.0 一键安装与配置技能。基于真实部署经验(2026-03-29),涵盖从下载仓库到成功运行的全流程,包括踩坑规避方案。 Use when: (1) 需要在 OpenClaw 环境安装 DeerFlow 2.0, (2) 需要快速排查安装问题, (3) 需要了解 DeerFlow 的最佳实践。
⭐ 1· 350·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description claim an installer for DeerFlow 2.0, which fits the provided runtime instructions (git clone, pip install, run services). However the metadata claims no required environment variables or credentials while the SKILL.md explicitly requires multiple API keys (OPENROUTER_API_KEY, TAVILY_API_KEY, INFOQUEST_API_KEY) and DEER_FLOW_CONFIG_PATH. This mismatch between declared requirements and the instructions is an incoherence the user should note.
Instruction Scope
The SKILL.md instructs the agent to modify repository source files (sed replacements, manual_EDIT of a specific line), create virtualenvs, install Python packages, write config files (.env, config.yaml), and start background services (nohup). It also recommends enabling tools such as read_file, write_file and bash in DeerFlow's tool config — these are powerful capabilities that go beyond mere configuration and could allow arbitrary file reads/writes and command execution once the service and integration are active. All actions are plausible for an installer, but the combination and lack of explicit credential declarations is a red flag.
Install Mechanism
This is an instruction-only skill (no install spec, no bundled code), which minimizes supply-chain risk from hidden downloads. It does instruct pip installs of third-party packages and cloning from the public GitHub repo, which is expected for a Python-based installer. There is no direct download of arbitrary archives from unknown hosts in the skill itself.
Credentials
Although the skill metadata lists no required env vars/credentials, the instructions clearly require multiple API keys (OPENROUTER_API_KEY, TAVILY_API_KEY, optionally INFOQUEST_API_KEY) and mention DEER_FLOW_CONFIG_PATH. That omission in metadata is inconsistent and could mislead users about what secrets will be used. Additionally, enabling tools like 'bash' and 'write_file' in the config grants the running system broad ability to access and modify files and execute commands — ensure API keys have least privilege and are not reused.
Persistence & Privilege
The skill does not set always:true and does not request any special platform-level persistent privilege. It does instruct creating files, scripts, and a new OpenClaw skill integration directory, which is normal for an installer. Still, the runtime recommendations (enable sandbox tools, start background processes) increase the agent's long-term capabilities in the environment and should be reviewed before enabling.
What to consider before installing
This skill mostly matches an installer for DeerFlow, but there are important inconsistencies and risk points to consider before running anything: 1) Metadata omission — the skill file asks you to set API keys (OpenRouter, Tavily, InfoQuest) and DEER_FLOW_CONFIG_PATH but the registry metadata lists none; assume the runtime will use those keys. 2) Secrets scope — only supply API keys with minimal privileges and separate keys for test/sandbox environments; never reuse high-privilege or long-lived credentials. 3) Code modifications — the instructions perform repo-wide sed edits and manual source edits; review those changes locally or in a disposable environment before applying to production code. 4) Powerful tools enabled — the recommended tool config enables read_file, write_file and bash tools; enabling these gives agents the ability to read/write files and execute commands. Only enable them if you trust the running services and have appropriate isolation. 5) Run in isolation first — prefer Docker mode (recommended by the guide) or a dedicated VM/container, snapshot or backup the workspace, and test the start_all.sh flow manually. 6) Verify upstream sources — confirm the GitHub repo and referenced packages are the intended upstream (watch for forked/malicious repos). 7) If you want safer adoption, ask the skill author to update metadata to declare required env vars and to provide an explicit audit checklist of the exact files changed by patches. Following these steps will reduce the chance of inadvertent credential exposure or destructive changes.Like a lobster shell, security has layers — review code before you run it.
latestvk97fg8h6dj5xrsdjfj2qsbskzh83vynf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
