Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Docx Cn
v1.0.1Word 文档处理 | Word Document Processing. 创建、读取、编辑 Word 文档 | Create, read, edit Word documents. 支持 .docx 格式、格式化、表格、图片 | Supports .docx format, formatting, tables...
⭐ 1· 5k·38 current·43 all-time
byGuohongbin@guohongbin-git
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (DOCX processing) matches the included Python tools for unpacking/packing/validating/editing .docx files. However the skill relies on several system tools (LibreOffice/soffice, pandoc, pdftoppm, npm 'docx', and gcc for building a shim) implied by SKILL.md and code but not declared in the skill's requirements/metadata. The presence of a C shim and LibreOffice macro creation are plausible for the stated purpose but are not documented in the metadata—this mismatch is surprising and should be justified by the author.
Instruction Scope
SKILL.md instructs use of pandoc, node 'docx' package, and LibreOffice; the included Python scripts perform file I/O on unpacked Office XML and write files under /tmp (e.g., LibreOffice macro directory) and to unpacked directories. The code also compiles and LD_PRELOADs a native shim at runtime and will write macros to a LibreOffice profile path. Those side effects (writing macros, compiling native code, creating LD_PRELOAD shared objects) extend beyond simple XML edits and should be explicitly documented and consented to.
Install Mechanism
There is no install spec, but the code contains a runtime build step: office/soffice.py writes C source to the temp directory and runs 'gcc' to create a shared object (lo_socket_shim.so) which it then LD_PRELOADs. Relying on runtime compilation and LD_PRELOAD (and on gcc being present) is higher risk and not declared. No external network downloads were observed in the provided files, which reduces one vector, but compiling native code and injecting it via LD_PRELOAD is inherently sensitive.
Credentials
The skill declares no required environment variables or credentials, and the code does not attempt to read secrets or external credentials. This is proportionate to the stated purpose. However the code does alter local state (libreoffice profile in /tmp) and writes files; while not credential access, it is persistence of a sort and should be considered.
Persistence & Privilege
The skill does not request 'always:true', but it does create persistent artifacts: a LibreOffice macro in a profile under /tmp (LIBREOFFICE_PROFILE) and a shared object file in the system temp directory (lo_socket_shim.so). The macro will be invoked by LibreOffice and the shim is loaded via LD_PRELOAD for invoked soffice processes. Those actions change local runtime behavior and persist across runs until the temp files are removed; they are privileged enough that you should review and run in a sandbox.
What to consider before installing
What to consider before installing:
- Dependencies: The skill expects external system tools (LibreOffice/soffice, pandoc, pdftoppm, node/npm with the 'docx' package, and gcc) but the package metadata does not declare them. Confirm you have (or want to install) these tools and understand their versions.
- Runtime native build + LD_PRELOAD: The skill will write C source to your temp directory and run 'gcc' to build a shared object it sets via LD_PRELOAD for LibreOffice invocations. This is powerful: a native shared object can alter process behavior and should be inspected and run only on trusted systems or inside an isolated container/VM.
- LibreOffice macro insertion: The skill creates a LibreOffice Basic macro in a profile under /tmp to accept tracked changes. That macro persists until removed and allows LibreOffice to execute document-level operations—review the macro contents and run in a sandbox if you have sensitive data.
- License/provenance mismatch: LICENSE.txt contains restrictive Anthropic terms while _meta.json states MIT; source/homepage are unknown. Confirm the true license and trustworthiness of the author before adopting this skill.
- Recommended precautions: review the C source (lo_socket_shim.c) and Python scripts, test the skill in an isolated environment (container or disposable VM) before using it on sensitive documents, avoid running on production hosts, and verify or declare the required system packages in your environment. If you need to use it but want lower risk, extract and run only the pure-Python XML manipulation scripts (they do not perform compilation) after manual review.Like a lobster shell, security has layers — review code before you run it.
chinesevk978tm17x5djrd6yjnmtke7xy981a88bdocumentvk978tm17x5djrd6yjnmtke7xy981a88blatestvk97d2dt0srkrk2xq1gacq16qj581gbyywordvk978tm17x5djrd6yjnmtke7xy981a88b
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📄 Clawdis
