Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
多个微信公众号文章同步和下载
v0.3.2微信公众号文章同步与详情抓取助手。支持公众号后台登录、搜索与添加公众号、同步文章列表、抓取单篇或单账号文章详情、下载文章图片、配置代理、导出最近文章汇总和 Markdown 报告。用于“查最近文章”“抓文章详情”“下载公众号文章图片”“同步指定公众号文章”“按账号导出汇总”等场景。
⭐ 0· 245·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name and description (WeChat article sync/download) align with the code's functionality. However the registry metadata declares no required binaries, no env vars, and 'instruction-only' install spec while the bundle actually contains many Python scripts, a requirements.txt, and code that calls an external CLI ('openclaw') via subprocess. The omission of required tooling (Python packages, openclaw CLI) in metadata is an incoherence and could surprise users.
Instruction Scope
SKILL.md instructs users to run the bundled CLI entrypoints and to log into WeChat backend, set proxies, download images and export reports. That is consistent with the code. The runtime instructions do not ask the agent to read unrelated system files, but the code will create and modify local files and a SQLite DB (login sessions, articles, images). The skill also uses the 'openclaw' CLI to send progress messages during syncs — SKILL.md documents notifications but does not call out that this requires a working external CLI or how messages might be routed.
Install Mechanism
There is no install spec even though a requirements.txt is present and the package includes runnable Python scripts. This means dependencies and runtime tools must be installed manually. The code invokes external binaries (openclaw) and runs subprocess calls; the absence of an install/install-time verification step is an inconsistency and increases chances of runtime surprises.
Credentials
Metadata declares no required environment variables or credentials, but code reads environment variables for logging toggles and will persist WeChat login sessions and article data locally. The skill interacts with remote WeChat endpoints (via mp_client) and may forward notifications through an external messaging CLI. No secret/credential env vars are explicitly required, but the skill will store login/session information in its local DB — this persistent storage is not represented in the metadata.
Persistence & Privilege
The skill writes data to disk (creates directories, touches a SQLite DB, saves images and exported Markdown). It is not configured with always:true and does not modify other skills. Storing login sessions and article content locally is expected for the described purpose, but users should be aware the skill will persist potentially sensitive session state on the host filesystem.
What to consider before installing
This skill appears to implement a full WeChat MP scraping/sync tool (login via QR, fetch article lists/details, download images, export Markdown, send progress notifications). Before installing or running it, consider:
- Metadata omissions: the package requires Python packages (requirements.txt) and invokes an external 'openclaw' CLI, but the registry metadata lists no required binaries or install steps — you must install dependencies and ensure 'openclaw' is present yourself.
- Local persistence: it will create directories, write a SQLite DB, save images and Markdown exports, and store WeChat login/session data on disk. If you don't want that data persisted on your machine, do not run it or run in an isolated environment.
- Notifications/exfiltration risk: sync-all and other flows call 'openclaw message send' via subprocess to notify targets. Ensure any messaging targets/channel/account configured for notifications are trusted; otherwise the tool could forward scraped content externally.
- Proxies and network access: the tool supports configuring proxies and will access WeChat endpoints; review network behavior (inspect mp_client.py and login_service.py) if you need to limit outbound connections.
- Run in sandbox: because it executes subprocesses and writes files, run it in a controlled environment (VM or container) or inspect the code (notably mp_client.py, login_service.py, openclaw_messaging.py, and any code that performs HTTP requests) before use.
If you want to proceed, install dependencies in a virtualenv, audit mp_client/login_service for endpoints and credential storage, and confirm 'openclaw' command behavior and where notifications would be sent.Like a lobster shell, security has layers — review code before you run it.
latestvk97ea5zr9ec92szxw3ykg9ef758492gf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
