Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Gangtise Kb

v1.0.0

Query Gangtise knowledge base API to search and retrieve financial/market information. Use when the user asks about stocks, companies, market concepts, finan...

0· 112·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name, description, and scripts match the stated purpose (querying Gangtise knowledge base). However the repository includes a pre-populated config.json with ACCESS_KEY/SECRET_KEY (credentials) and the top-level wrapper expects a local binary (gangtise-kb/gangtise-kb.py) that is not present in the file manifest — packaging is inconsistent with the expected runtime.
Instruction Scope
SKILL.md and the scripts only call Gangtise API endpoints and store/use API credentials; they do not attempt to read unrelated system files. Concerns: multiple scripts disable SSL certificate verification (ctx.check_hostname=False and verify_mode=CERT_NONE or use of ssl._create_unverified_context()), which weakens transport security. temp_query.py performs several automated queries when run (not harmful by itself but will send queries using whatever credentials are present).
Install Mechanism
This is an instruction-and-script-only skill with no install spec or external downloads. No archive extraction or remote installers are used.
!
Credentials
The skill declares no required environment variables, but the package ships with a filled config.json containing ACCESS_KEY and SECRET_KEY. Including live credentials in the bundle is disproportionate and risky (leaked/compromised keys, unintended usage). The scripts will use those keys automatically if the user does not overwrite them. No other unrelated credentials are requested.
Persistence & Privilege
The skill does not request elevated privileges and is not always-enabled. It stores configuration in a local config.json file (its own path) and configure.py sets file permissions to 600. That behavior is expected, but the presence of a pre-filled config.json means the skill will persist and use embedded credentials unless changed.
What to consider before installing
This skill appears to implement a legitimate Gangtise KB client, but there are notable red flags you should address before using it: 1) The package includes config.json with ACCESS_KEY and SECRET_KEY already filled — do not assume these are safe to use. Remove or overwrite that file and provide your own credentials (and rotate any real keys if published). 2) The network code disables SSL certificate verification; consider editing get_token.py/query_kb.py/temp_query.py to use normal certificate checks (remove the check_hostname/verify_mode overrides or use a verified context). 3) The top-level wrapper expects a binary gangtise-kb/gangtise-kb.py which is not present — the skill may fail or behave unexpectedly; inspect and test in a sandbox. 4) Run these scripts in a controlled environment (offline or network-restricted VM) until you replace credentials and fix SSL settings. If you plan to grant persistent or autonomous invocation to an agent, be extra cautious because the embedded credentials could be used without further prompts. If you want me to, I can show the exact lines to change to re-enable SSL verification or help remove the embedded credentials safely.

Like a lobster shell, security has layers — review code before you run it.

latestvk9797js29fydx2j0y0y2gc0735832z7w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments