Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

腾讯自选股数据工具

v1.0.0

查询A股、港股、美股个股/指数/ETF的详细数据,包括:K线/分时、财务报表(三大报表多期查询,支持跨市场批量对比)、资金流向、技术指标、筹码分析、股东结构、分红除权、业绩预告、公司简况、ETF基金数据(详情/持仓/净值);以及大盘指数、行业/板块、热搜、新股日历、投资日历等市场数据。

0· 18·0 current·0 all-time
by泡泡@hellopao
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchasesRequires OAuth token
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The stated purpose (querying market data from Tencent) legitimately requires network access and a runnable CLI. However the registry metadata and SKILL.md present this as an instruction-only tool with no required env/config, while package.json and a 3.6MB scripts/index.js are included (CLI entrypoint). That mismatch (instruction-only appearance vs. bundled binary) is unexpected and reduces transparency.
!
Instruction Scope
SKILL.md instructs only how to call the CLI and format outputs and does not instruct reading environment or local system state. The bundled scripts/index.js explicitly creates Deno-like helpers that expose process.env (Deno.env.toObject / Deno.env.get) and enumerates network interfaces — the runtime can therefore read environment variables and local network info even though SKILL.md does not declare or justify that access.
!
Install Mechanism
There is no explicit install spec (no external downloads), which is lower install risk, but the package includes a large, minified/obfuscated Node.js bundle (~3.7MB). Obfuscated/minified bundles are harder to audit for hidden behavior (telemetry, network callbacks, data exfiltration). The included binary modifies globals (globalThis.require) and appears to bundle many dependencies, increasing the attack surface.
!
Credentials
Declared requirements list no environment variables or credentials, yet the code provides Deno.env.get and Deno.env.toObject accessors and reads network interfaces. Unannounced ability to read all environment variables (and system network info) is disproportionate to the stated read-only market-data lookup purpose and could allow secret leakage or telemetry if the code transmits them.
Persistence & Privilege
The skill does not request 'always: true' or other elevated platform privileges and is user-invocable only. However, because the package includes executable code that can run autonomously when invoked by the agent, the default autonomous invocation combined with undisclosed env/network access increases risk — not a direct privilege escalation but worth caution.
What to consider before installing
Do not install blindly. The package includes a large, minified Node.js CLI (scripts/index.js) that exposes environment and network info but the SKILL.md and metadata do not disclose this. Before using: (1) request the full unobfuscated source or a readable audit of scripts/index.js; (2) grep the code for outbound network endpoints (http(s) URLs, IPs, telemetry domains), child_process/net/socket usage, and any code that transmits process.env; (3) run the CLI in a sandboxed environment with sensitive environment variables removed; (4) if you must run in production, restrict agent autonomous invocation and remove/rotate any secrets present in the environment; (5) prefer an alternative whose code is small and human-readable or whose network/credential needs are explicitly declared. If the publisher can justify why env and network interface access is needed and provide a readable source map or audit, confidence could be raised.
scripts/index.js:3
Shell command execution detected (child_process).
scripts/index.js:8
Dynamic code execution detected.
scripts/index.js:3
Environment variable access combined with network send.
!
scripts/index.js:7
Potential obfuscated payload detected.
!
scripts/index.js:7
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk971ct2e8w35tx1kfxqyvcf4gd84k4fs

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments