Fund Report Processor

PendingAudited by VirusTotal on May 11, 2026.

Overview

No VirusTotal analysis has been recorded yet. File reputation checks will appear here once the artifact hash has been scanned.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone with access to the skill files could learn or abuse vault access, and the agent can retrieve mailbox credentials without prompting the user.

Why it was flagged

The source embeds a concrete Bitwarden account and master password, then uses them to unlock the vault and retrieve the work-email username/password.

Skill content
self.email = "1718...@qq.com"; self.master_password = "[plaintext value]"  # 从永久记忆中获取
Recommendation

Treat the exposed Bitwarden and email credentials as compromised, rotate them, remove all plaintext secrets from the package, and require explicit user-provided credentials or a scoped secret manager integration.

What this means

A persistent memory or session-file leak could expose long-lived access to the password vault and downstream financial email account.

Why it was flagged

The guide explicitly places the vault master password in persistent agent memory and reuses a saved Bitwarden session file across runs.

Skill content
已保存在永久记忆 (MEMORY.md) 中: ... 主密码: [redacted] ... 保存会话到 `~/.bw-session`
Recommendation

Do not store master passwords in agent memory; use short-lived user approval, OS keychain/secret storage, and clear session expiration and revocation steps.

What this means

The agent could continue accessing email and generating financial outputs on a schedule after the user has stopped actively supervising it.

Why it was flagged

The skill is designed for unattended scheduled execution while also automatically unlocking credentials and processing mailbox data.

Skill content
crontab 配置
0 9 * * * cd /path/to/skill && python3 zero_interaction_runner.py
Recommendation

Require an explicit opt-in for scheduling, document how to disable it, avoid stored master credentials, and add run-time confirmations or least-privilege scopes for sensitive actions.

What this means

The skill may read more mailbox content than a user expects for a report extractor, especially when run unattended.

Why it was flagged

Batch mode searches all messages in the selected folder and fetches full email contents before filtering for fund-report subjects.

Skill content
result, data = mail.search(None, 'ALL') ... mail.fetch(email_id, '(RFC822)')
Recommendation

Restrict IMAP searches to a dedicated folder, sender, subject, or date range, and ask for confirmation before bulk historical mailbox processing.

What this means

Credential handling may depend on unreviewed or environment-supplied code, increasing the chance of unsafe behavior or installation surprises.

Why it was flagged

A high-impact credential-loading helper is referenced by the source but is not included in the provided manifest, so that credential path is not reviewable and could resolve to unexpected local code.

Skill content
from bitwarden_loader import load_fund_credentials
Recommendation

Include all credential-handling helpers in the package, pin dependencies, remove stale install references, and ensure the manifest matches the code actually executed.

What this means

Users may trust the skill's security posture and run it with sensitive accounts without realizing credentials are embedded in the package.

Why it was flagged

The user-facing description claims hardcoded passwords are avoided, but the included Bitwarden manager hardcodes a plaintext vault master password.

Skill content
🔒 安全管理: 集中化凭据管理,避免硬编码密码
Recommendation

Correct the documentation, disclose the credential model plainly, and remove the hardcoded master password before distribution or use.