suspicious.dynamic_code_execution
- Location
- tests/test_hik_open_device_group_management.py:20
- Finding
- Dynamic code execution detected.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.dynamic_code_execution
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If invoked with the wrong group or device identifiers, the agent could change or delete device organization data in the user's Hik-Cloud account.
The skill explicitly supports deleting groups, updating groups, and transferring devices in Hik-Cloud, which are account-mutating operations. The artifacts do not document confirmation, dry-run, or rollback requirements before these actions.
- 删除组 - 更新组 - 设备转移分组
Require explicit user confirmation for delete, update, create, and device-transfer operations; use least-privilege Hik-Cloud credentials; and review the target group/device identifiers before running.
Anyone who can access the configured credentials or cached token may be able to call Hik-Cloud APIs within the token's permissions.
The skill uses Hik-Cloud credentials to obtain access tokens and caches tokens. This is expected for the integration, but it is sensitive account access.
token cache ... HIK_OPEN_CLIENT_ID + HIK_OPEN_CLIENT_SECRET 自动换取
Store credentials securely, restrict file permissions on the token cache, rotate secrets if exposed, and prefer a credential with only the permissions needed for device group management.
Users have less external context for verifying who maintains the skill or where updates come from.
The skill's registry metadata does not provide an upstream source or homepage, which limits provenance verification even though the included code is reviewable.
Source: unknown Homepage: none
Install only if you trust the publisher, and prefer versions with a public source repository or documented provenance.