Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
sanxin_form_filler1
v1.0.0智能申报表填写工具。将申报报告内容智能填入申请表对应位置,保持原文档格式,新内容格式统一。适用于各类 Word 表格申请表自动填写。
⭐ 0· 124·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The description and SKILL.md state the tool will '智能' (automatically) map申报报告 contents into the application form. However, the runtime code (scripts/form_filler.py and example_usage.py) does not read or parse source_doc to extract sections — it only accepts a pre-built content_map provided by the caller. That is a functional mismatch: the skill advertises automatic extraction/mapping but the implementation requires manual mapping.
Instruction Scope
Instructions and docs indicate use of win32com to read Word structure and 'recognize each chapter', but the actual code only opens a form_doc, iterates table rows, and inserts text from content_map. The code does open and save Word documents (doc = word.Documents.Open(form_doc); doc.SaveAs2(...)), and sets word.Visible = True. While it does not perform network calls, opening Word documents may trigger macros, external templates, or OLE content in the documents — the skill does not mention sanitizing or disabling macros.
Install Mechanism
No install spec in the registry, but SKILL.md suggests pip install pywin32. That is a standard dependency for Windows Word automation and not inherently risky. There are no downloads from untrusted URLs and no archive extraction directives.
Credentials
The skill requests no environment variables, no credentials, and no config paths — this matches the stated local-file Word automation use-case.
Persistence & Privilege
always:false and no indication the skill modifies other skills or system-wide agent settings. It runs as an on-demand script and does not request elevated or persistent platform privileges.
What to consider before installing
Key things to consider before installing or running: 1) Functional mismatch: the skill claims automatic extraction from a report but the provided code does not parse source_doc — you must supply content_map manually or implement extraction yourself. 2) Windows-only: it relies on pywin32 and Microsoft Word/WPS; it won't work on Linux/macOS. 3) Safety: Word automation can execute macros or load remote templates; do not run this on untrusted documents and test only on copies. 4) Inspect code: review scripts/form_filler.py to confirm behavior and add protections (disable macros, open in protected view, or sanitize input) if you plan to run it on real reports. 5) If you need genuine automatic extraction, request or implement a parser that reads source_doc and builds content_map — as-is the skill does not provide that. If you are comfortable with these limitations and will run on trusted files/copies, the code itself performs only local file I/O and Word automation (no network exfiltration found).Like a lobster shell, security has layers — review code before you run it.
latestvk97acn6prs4ttq7715093ea5ns837g4y
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📝 Clawdis
Binspython
