News Digest

v0.1.0

User-configurable multi-slot news aggregation and push system. Schedule, topics, and keywords are defined by the user via config.json. Aggregates from Twitte...

0· 222·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims end-to-end aggregation and push delivery (mentions Feishu/Telegram), but the declared required environment variables only include TAVILY_API_KEY and XPOZ_API_KEY — there are no Feishu/Telegram tokens or other delivery credentials declared. Delivery integration code is not visible in the inspected files (delivery may be expected to be handled by the agent or by omitted files), which is an incoherence: either the skill should require delivery credentials or document how delivery is performed.
!
Instruction Scope
Runtime instructions and scripts instruct the agent/cron trigger to source a .env from workspace or home and set -a which exports all variables found there. That behavior can expose any unrelated secrets the user keeps in .env to the spawned openclaw run. The SKILL.md and env declarations only reference Tavily/Xpoz, but the cron script will load and export everything in the .env file — this broadening of scope is unexplained and potentially risky.
Install Mechanism
There is no remote install/download step embedded in the package (instruction-only install + included local Node.js scripts). All code is bundled with the skill and there are no external URL downloads or shorteners. Required binary is only node, which is proportionate.
!
Credentials
Requested environment variables (TAVILY_API_KEY primary, XPOZ_API_KEY optional) are appropriate for fetching data from Tavily and Xpoz, but the skill claims push/delivery without declaring delivery creds. Additionally, cron-trigger.sh and env-check suggest loading .env from common user locations — the cron script exports all variables from that file, which can leak unrelated secrets into the execution context. Also, parts of the code print masked API key fragments to stdout which may end up in logs (partial exposure).
Persistence & Privilege
always:false and the hook requires explicit enabling. The included bootstrap hook injects a virtual reminder file at agent bootstrap (reads only skill-local data/config.json). This is a normal, limited presence; it does not auto-enable itself or change other skills. The hook will run on every agent bootstrap if enabled, which increases frequency of reminder injections but is not inherently privileged.
What to consider before installing
This skill largely does what it says (fetches from Tavily, Hacker News, and optionally Twitter) and stores results locally, but two things merit attention before installing or enabling it: 1) Delivery gap: The SKILL.md promises delivery via Feishu/Telegram, yet there are no required environment variables or clear delivery scripts for those services in the inspected files. Ask the author or inspect the omitted files to confirm how push delivery is implemented and where to provide Feishu/Telegram credentials. If delivery runs via the agent's own connectors, make sure you understand which account/channel will be used. 2) .env sourcing and secret exposure: The cron-trigger.sh script sources an .env file and uses set -a (exports all variables). If your workspace ~/.env or ~/.openclaw/workspace/.env contains other credentials, those will be exported into the environment when cron runs this script and could be visible to the spawned OpenClaw session and to logs. Recommendations: - Keep the .env used by this skill minimal (only the keys needed for this skill), or use a dedicated .env for the skill root. - Run cron-trigger.sh --dry-run to confirm what it will do and which env file it picks up. - Inspect store-push and any delivery-related scripts (the audit omitted a few files) to ensure they don't transmit stored data or logs to unexpected endpoints. Other small points to check: the XPOZ/Twitter integration seems to rely on an external tool (xpoz_search_tweets) not bundled here — confirm you have or will provide that tool and its credentials; env-check prints a four-character prefix of TAVILY_API_KEY to stdout (may end up in logs) — if you consider that sensitive, avoid running env-check in shared log locations. Because these issues are about how secrets and delivery are handled (not obviously malicious code), treat the package as suspicious until you validate the delivery mechanism and restrict which .env is loaded.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cd0ev48d0v18exb6mnwkzph82d0jv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📰 Clawdis
Binsnode
EnvTAVILY_API_KEY, XPOZ_API_KEY
Primary envTAVILY_API_KEY

Comments