Dangerous exec
- Finding
- Shell command execution detected (child_process).
Security checks across static analysis, malware telemetry, and agentic risk
This appears to be a legitimate HubStudio reference/automation skill, but it exposes broad control over a logged-in HubStudio account and devices without strong built-in confirmations.
Install only if you want an agent to help control HubStudio resources through your logged-in desktop client. Avoid running `testAll` on a real account, require explicit confirmation before create/delete/shell/ADB/upload/app operations, and do not share command outputs that may contain device or ADB connection details.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If invoked by the agent or copied by a user, the skill can change or delete HubStudio resources or run commands on cloud phones.
The generated command set exposes high-impact HubStudio operations, including batch cloud-phone deletion and cloud-phone shell command execution, through the same generic CLI interface.
"command": "postV1CloudMobileDelMobileBatch" ... "summary": "批量删除云手机" ... "command": "postV1CloudMobileExeCommand" ... "summary": "执行shell命令"
Use this only with explicit user approval for mutating commands; add an allowlist/read-only mode and confirmation gates for delete, shell, ADB, upload, app install/uninstall, and account/group changes.
Running the all-endpoint test against a real HubStudio account could trigger unintended changes or noisy operations across browsers, cloud phones, apps, groups, or accounts.
`testAll` iterates over every generated endpoint and sends POST requests automatically, so one smoke-test command can attempt many account/device operations.
for (const cmd of COMMANDS) {
const result = await post(cmd.path, cmd.defaultBody || {}, cmd.defaultQuery || {});
}Do not run `testAll` on a production account unless the endpoints are explicitly allowlisted or mocked; make smoke tests read-only or require per-endpoint confirmation.
The agent may be able to act with the user's HubStudio privileges, affecting environments, cloud phones, accounts, and groups.
The local API calls operate in the context of the user's logged-in HubStudio client and cover broad workspace/account domains, while the registry metadata does not declare a primary credential.
Install and open HubStudio client on your machine, then log in. ... Browser Environment ... Cloud Phone ... Environment Management ... Account Management ... Group Management
Install only if you intend to grant broad HubStudio account control; document the credential/session dependency in metadata and require explicit approval for account, billing-like, deletion, shell, and ADB operations.
Running the demo may execute local commands on the user's machine.
A provided demo script uses local shell command execution. This can be normal for an automation demo, but the full context should be reviewed before running it.
const output = execSync(cmd, { encoding: "utf8" });Review the demo script and run it only from a trusted checkout; avoid passing untrusted input into any shell command.