Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Case Echo

v0.1.0

extract simple structured json fields from a short chinese medical case description. use when the user provides a brief chinese case summary and wants standa...

0· 29·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (extract structured fields from Chinese case text) aligns with the included scripts which perform regex-based extraction. Minor mismatch: SKILL metadata lists no required binaries, but the runtime instruction and scripts invoke python3, so the skill implicitly requires a python3 runtime to be available.
Instruction Scope
SKILL.md instructs running the bundled shell script with the case text as a single argument. The scripts only read the provided text and return JSON; they do not access other files, environment variables, or external endpoints.
Install Mechanism
Instruction-only installation (no install spec). Two small local scripts are bundled; nothing is downloaded or extracted from external URLs.
Credentials
The skill requests no environment variables or credentials. The code does not attempt to read secrets or unrelated env vars.
Persistence & Privilege
The skill is not always-enabled and does not modify agent/system configuration. It runs only when invoked and has no elevated persistence or privileges.
Assessment
This skill appears coherent and limited to parsing provided Chinese case text into JSON. Before installing: 1) Ensure python3 is available on the host (the SKILL.md should declare this dependency). 2) Treat any input as protected health information — avoid feeding real patient-identifiable data unless you have appropriate consent and controls. 3) Test with non-sensitive examples to confirm the output format meets your needs; the extraction is regex-based and intentionally simple, so it may miss or mis-handle nonstandard phrasing. 4) If you need production use, consider reviewing/expanding the extraction patterns or adding logging/privacy controls.

Like a lobster shell, security has layers — review code before you run it.

latestvk9752nmkwrdf9mxce2b5wz6ffh842mcx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments