Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

gnview-api-downloader

v1.0.0

抖音数据API工具集,包含用户数据获取、Cookie更新等完整API接口。适用于抖音数据采集的场景。

0· 29·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill claims to be a Douyin data API toolkit and the included reference docs describe endpoints for fetching videos, user info and updating cookies—this aligns with the stated purpose. However, the SKILL.md points to a concrete external API gateway domain (sd79uu743j76vf3vkn7pg.apigateway-cn-beijing.volceapi.com) while config.json suggests a configurable base_url; the package metadata and homepage do not disclose the external service operator. That discrepancy (hidden backend) is notable.
!
Instruction Scope
Runtime instructions explicitly tell users/agents to extract full browser Cookie strings (ttwid, odin_tt, passport_csrf_token) and POST them to the remote API to 'update_cookie' and maintain sessions. They also show curl/jq shell examples that send user URLs and cookie values to the external gateway. These steps involve reading and transmitting sensitive credentials and session tokens outside the local environment, which goes beyond benign bookkeeping and should be treated as potential credential exfiltration.
Install Mechanism
This is an instruction-only skill with no installers or code files to execute; nothing is written to disk by an install step. That lowers the risk of arbitrary code execution. (However, runtime instructions do assume availability of tools like curl and jq, which are not declared as required binaries—minor inconsistency.)
!
Credentials
The skill does not request environment variables or credentials via metadata, but it explicitly instructs the user/agent to supply and transmit highly sensitive cookies and session tokens. Because the metadata doesn't declare or warn about this requirement and the remote endpoint owner is not documented, the scope of required secrets is disproportionate and opaque.
Persistence & Privilege
The skill does not request always:true or any persistent elevated privileges, and it does not modify other skills or system-wide configuration. Autonomous invocation is allowed (platform default) but not by itself a red flag here.
What to consider before installing
This skill will send Douyin/TikTok profile URLs and full browser cookie strings (session tokens like ttwid, odin_tt, passport_csrf_token) to an external API gateway (the examples point to sd79uu743j76vf3vkn7pg.apigateway-cn-beijing.volceapi.com). The package metadata does not identify the service owner or a homepage. Before installing: (1) do not paste live account cookies unless you trust the operator and have reviewed their privacy/security policy; (2) prefer using read‑only data or anonymized tokens instead of full cookies; (3) if you must use it, change cookies/passwords after testing and run the skill in an isolated environment; (4) verify or override config.json.base_url to a trusted host or self-host the backend if possible; (5) be cautious about automated agents executing the documented curl commands because they will transmit secrets to the remote host. If you can contact the author or see an official homepage and privacy statement, that could raise confidence; absent that, treat it as risky.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b3fyfatm84bwse4bnvq2qnh84nkcd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments