Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

门店客流分析

v1.0.0

门店客流与转化漏斗分析工具。基于AIoT客户行为数据(customerFunnel + behaviorFunnel)。 核心能力: 1. 双漏斗结合分析(customerFunnel客户分层 + behaviorFunnel试用行为) 2. 五步分析法(获取数据→解析customerFunnel→解析behav...

0· 76·0 current·0 all-time
byXtechmerge.AI@gwyang7
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The code and SKILL.md match the described purpose (fetch customerFunnel and behaviorFunnel, compute conversion metrics). However, the implementation inserts a hard-coded sys.path to '/Users/yangguangwei/.openclaw/workspace-front-door' to import api_client, which is a user-specific path and unusual for a distributable skill; this is a coherence / portability oddity (works only in that environment) and could cause the skill to pick up arbitrary local code.
Instruction Scope
SKILL.md instructs the agent to fetch data from an API endpoint and run the analysis — consistent with the code. The code delegates all network/data access to api_client.get_copilot_data('/api/v1/store/dashboard/bi?...'). The SKILL.md does not specify how api_client is configured or what credentials it uses. Because data fetching is outsourced to api_client, the runtime behavior depends entirely on that module (which may perform network calls, use local credentials, or contact unexpected endpoints).
Install Mechanism
No install spec or external downloads are present; the skill is instruction+code only. Nothing is written to disk by an installer in the provided files.
!
Credentials
The skill declares no required environment variables or credentials but imports a local api_client that almost certainly requires configuration (API host, auth tokens). The hard-coded insertion of a local absolute path means the skill can import code from a user's filesystem location, which could access local secrets or system-configured credentials. The lack of declared credential requirements is a mismatch and a potential avenue for unexpected access to sensitive data.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or global agent settings, and returns results without persisting changes. No elevated persistence behavior observed.
What to consider before installing
This skill appears to implement the documented analysis but has two issues you should verify before installing: 1) Hard-coded import path: analyze.py inserts '/Users/yangguangwei/.openclaw/workspace-front-door' into sys.path and imports api_client. That means the skill will load code from that local path if present. Verify who authored the api_client at that location and what it does. If you don't control or trust that path, the skill could execute arbitrary local code. 2) Undeclared credentials/config: The skill calls get_copilot_data(...) to fetch store data but doesn't declare required API host or authentication environment variables. Inspect api_client.get_copilot_data to see where it sends requests and which credentials it uses. Ensure it doesn't send data to unexpected endpoints or read secrets from your environment (e.g., ~/.aws, token files, or other local config). Recommended actions before use: - Open and review the api_client implementation that will be imported in your environment (or run the skill in an isolated sandbox where you control api_client). - Replace the hard-coded sys.path insertion with a documented import/install mechanism (or vendor a minimal, audited api client in the skill) and require explicit env vars for API host and token. - Run the skill in a restricted environment or with network monitoring to confirm it only calls the intended API endpoint and does not exfiltrate data. If you can provide the api_client source or confirm where get_copilot_data sends requests and how it's authenticated, I can reassess and raise or lower the concern level.

Like a lobster shell, security has layers — review code before you run it.

latestvk97584ev4mnfyfwbjc6y4m3csn83nn92

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments