social-media-analysis
Analysis
This skill matches its stated social-media analysis purpose, but it can use Feishu app credentials to read and bulk-update business table records while also making broad external network and shell-tool calls that are under-declared in the registry metadata.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
entrypoint:
command: "node"
args:
- "scripts/run_backfill.js" ... `yt-dlp -o video.mp4 URL` ... `ffmpeg -i video.mp4 -vf "fps=1/5"`The skill entrypoint runs a backfill script and the workflow documents broad media-processing commands over table-provided URLs. These operations are central to the purpose but are powerful and depend on external tools and untrusted URL inputs.
const result = execSync(cmd, { encoding: 'utf8' });The static scan shows synchronous shell command execution inside a parser script. Shelling out is expected for this media-downloading skill, but users should treat it as sensitive execution authority.
| `yt-dlp` | 微博/B 站视频下载 | | `ffmpeg` | 视频抽帧 | | `node` | 运行 JS 脚本 | | `playwright` | 今日头条渲染 |
The skill depends on external local tools, but the registry declares no required binaries and there is no install spec. This is not malicious, but it leaves provenance and setup requirements to the user.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const APP_ID = env("APP_ID");
const APP_SECRET = env("APP_SECRET");
const BITABLE_URL = env("BITABLE_URL"); ... body: JSON.stringify({ app_id: APP_ID, app_secret: APP_SECRET }) ... records/batch_updateThe script uses Feishu app credentials to obtain a tenant access token and then batch-update Bitable records. This is purpose-aligned but grants high-impact read/write authority over business data.
const DEFAULT_COOKIE = COOKIE || process.env.XHS_COOKIE || '';
...
headers: {
'Cookie': DEFAULT_COOKIE,The script can use a Xiaohongshu cookie supplied by argument or environment variable. This is expected for accessing protected content, but it is session credential handling.
