Back to skill
Skillv1.0.0
ClawScan security
课件帮 Aippt · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 23, 2026, 12:16 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill largely matches its stated purpose (creating PPTs via Kejian365) but has multiple internal inconsistencies and some risky choices (undeclared required credential, credential persistence to disk, and contradictory display rules) that you should understand before installing.
- Guidance
- Things to consider before installing: - The code requires KEJIAN365_AUTH_TOKEN but the registry metadata does not declare this — expect to provide that env var or the script will fail. - Do NOT paste your real token directly into chat as suggested in README; prefer setting KEJIAN365_AUTH_TOKEN in a secure environment (or a scoped temporary token). Pasting into chat stores the secret in conversation history and is risky. - The helper script saves the auth token into task_state.json in the chosen work directory. If you install/use this skill, decide where work directories will live and who can access them; remove task_state.json after use if you don't want the token retained. - The SKILL.md contains contradictory rules about showing links/IDs vs. the scripts printing the view URL — confirm with the publisher how links will be handled so your tokens and raw URLs are not inadvertently exposed. - If you need stronger assurance: inspect the repository yourself, run the scripts locally with a temporary test token, or ask the publisher to (a) declare required env vars in registry metadata, (b) stop persisting auth_token to state files, and (c) avoid instructing users to paste tokens into chat. - Overall: the skill appears to implement the stated functionality, but the metadata/README/instructions mismatch and the token-on-disk behavior are meaningful risks you should address before trusting production secrets.
Review Dimensions
- Purpose & Capability
- concernThe code and SKILL.md clearly use the Kejian365 API and require an auth token (KEJIAN365_AUTH_TOKEN). However the registry metadata lists no required env vars or config paths — that metadata omission is inconsistent and could mislead users about what secrets are needed.
- Instruction Scope
- concernSKILL.md prescribes a linear workflow and instructs the agent to use the provided helper scripts rather than calling APIs directly. However the SKILL.md contains contradictory guidance: a 'HARD RULE' says NEVER show raw URLs/ppt_id/work_dir to the user, but the scripts print a view URL to stdout which the agent is instructed to parse and display (and Step 6 says to show the preview link). The instructions also require writing/reading state and params files in a workspace — the agent will read/write local files (task_state.json, params.json).
- Install Mechanism
- okNo install spec is present (instruction-only with small helper scripts). No external downloads or package installs are requested, which is appropriate for the described functionality.
- Credentials
- concernOnly one credential is needed in practice (KEJIAN365_AUTH_TOKEN), which is proportional. But that credential is not declared in the registry metadata (inconsistency). The README additionally encourages pasting your token into chat (saving it in conversation memory) which is a privacy risk and not necessary given the env-var option.
- Persistence & Privilege
- concernThe scripts persist state into a work directory (task_state.json) and explicitly save the auth token into that file under the key auth_token. This means the provided token can be written to disk in workspace paths (e.g., /mnt/user-data/workspace/...), potentially accessible later by other processes or skills. The skill does not request broader system privileges, but storing secrets to disk is a noteworthy persistence/privacy risk.
