Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

xhs-kit-publisher

v1.0.0

使用xhs-kit Python库高效发布小红书内容,无需浏览器,支持多账号和定时发布

1· 458·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the instructions: SKILL.md describes using the xhs-kit Python library to publish to 小红书 and the included requirements and example commands (pip install xhs-kit, xhs-kit publish, QR login) are coherent with that purpose. Minor contradiction: the description claims '无需浏览器' yet the instructions and requirements include Playwright and 'playwright install chromium', which will download browser binaries. This could be explainable (headless browser used for login), but it's a mismatch between marketing text and install steps.
!
Instruction Scope
SKILL.md instructs the agent/user to create and delete local config (~/.config/xhs-kit), save and use cookie files (config/account1_cookies.json), set environment variables (XHS_COOKIES_FILE, XHS_IMAGE_DIR, XHS_PUBLISH_INTERVAL), run login flows (QR code) and publish commands. These operations touch local credentials (cookies) and user config directories; the skill's metadata did not declare these as required config/credentials. The instructions also include commands that remove config directories (rm -rf ~/.config/xhs-kit), which is potentially destructive and should be performed deliberately by the user.
Install Mechanism
This is an instruction-only skill (no install spec), but SKILL.md and package.json recommend pip installing packages from PyPI and running 'playwright install chromium', which downloads browser artifacts. Installing packages from PyPI and Playwright is a common and expected mechanism here but carries the usual risks: verify the xhs-kit package source (PyPI/GitHub) before installing, and run installs inside an isolated virtualenv. There is no direct download-from-unknown-URL in the skill bundle itself.
!
Credentials
Registry metadata declares no required environment variables or credentials, yet the instructions reference multiple environment variables (XHS_COOKIES_FILE, XHS_IMAGE_DIR, XHS_PUBLISH_INTERVAL) and rely on cookie files that effectively contain authentication for accounts. The skill suggests creating and using cookie files (sensitive material) but does not declare or justify how secrets/config are handled. This mismatch is a data-exfiltration risk if cookie files are mismanaged or uploaded inadvertently.
Persistence & Privilege
The skill is not set to always:true and does not request system-wide privileges. It is instruction-only and has no bundled code that would persist on the system other than what the user explicitly installs (pip packages, Playwright). The agent may invoke it autonomously by default (disable-model-invocation is false), which is normal platform behavior but increases the importance of the other flagged concerns.
What to consider before installing
This skill looks like a legitimate wrapper around the xhs-kit tooling, but review and verify before running: - Verify xhs-kit source: check the upstream GitHub/PyPI project (the SKILL.md links a placeholder GitHub). Confirm the xhs-kit package is trustworthy before pip installing. - Use an isolated Python virtualenv and inspect requirements.txt; don't run pip install globally. - Playwright installs browser binaries — if you truly want no browser, ask the author to explain why Playwright is required. - Cookie files contain account authentication. Treat them as secrets: store them with appropriate file permissions, do not upload them to unknown services, and avoid reusing cookies from unknown sources. - The instructions include 'rm -rf ~/.config/xhs-kit' — do not run destructive commands unless you understand consequences. - Ask the skill author to explicitly declare required env vars/paths and justify any config paths it reads/writes. If you need stronger assurance, request a link to the official xhs-kit repository (not a placeholder) and inspect that project's code and release artifacts before use.

Like a lobster shell, security has layers — review code before you run it.

latestvk97070cxn7s6vhhvc48d2ptgq582gc0t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🚀 Clawdis

Comments