Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Crane Hook Annotation

v1.0.0

Detect and tightly annotate tower-crane hook outlines in similar construction-site monitoring images. Use when Codex needs to batch-process `.png`, `.jpg`, o...

0· 52·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The name, description, profile JSON, and tuning docs all align with a crane-hook annotation tool — that part is coherent. However, the SKILL.md requires running scripts/annotate-crane-hooks.ps1 (and the Quick Start references a .\skills\crane-hook-annotation\scripts\annotate-crane-hooks.ps1 path) but no such script is present in the file manifest. A skill that claims to perform local image processing but omits its core executable is an integrity/incompleteness problem.
!
Instruction Scope
The instructions are narrowly scoped to local image annotation and profile tuning (no unexpected exfiltration endpoints or unrelated system access). However, they direct the user to run a PowerShell script with -ExecutionPolicy Bypass — a flag that disables script execution restrictions and should only be used for trusted scripts. Because the referenced script is absent, the instructions currently ask the user to obtain/execute code that isn't supplied, which increases risk.
Install Mechanism
There is no install spec and no binaries requested — the skill is instruction-only and doesn't automatically write or download code. That lowers the packaging-installation risk. The risk instead arises from the missing script the instructions expect.
Credentials
The skill requests no environment variables, credentials, or config paths — this is proportionate for an offline image-annotation tool. There is no indication of unrelated credential access.
Persistence & Privilege
always is false and the skill does not request persistent system privileges. agents/openai.yaml sets allow_implicit_invocation: true, so the agent could implicitly invoke this skill when eligible; that is a normal setting but worth noting if the skill later gains network/exfiltration behavior. By itself this is not a strong red flag.
What to consider before installing
Do not run unknown PowerShell scripts you can't inspect. Before installing or using this skill: (1) confirm the missing script (scripts/annotate-crane-hooks.ps1) is provided by a trusted source and inspect its contents for network calls, data uploads, or commands that modify the system; (2) avoid using -ExecutionPolicy Bypass unless you fully trust the script; (3) request the author/source homepage or repository to verify provenance — the skill currently lists source as unknown; (4) if you must test, run the script only on non-sensitive sample images in an isolated environment (or sandbox/VM) and search the script for any outbound network operations or calls to curl/powershell Invoke-WebRequest/Invoke-RestMethod; (5) prefer packages that include their executables or are published by a verifiable maintainer. The core coherence issue (missing script) should be resolved before trusting this skill.

Like a lobster shell, security has layers — review code before you run it.

construction-monitoringvk973rrvn5tr54aevcztssb1e8183hjmximage-annotationvk973rrvn5tr54aevcztssb1e8183hjmxlatestvk973rrvn5tr54aevcztssb1e8183hjmx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments