Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
xhs-copywriter
v1.0.0Generates trending Xiaohongshu notes by extracting hot keywords, popular structures, and engagement tips for ready-to-post, high-potential content.
⭐ 0· 46·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description: generate Xiaohongshu (小红书) trending notes. Implementation: includes a Python script that sends user keywords to https://onetotenvip.com/skill/cozeSkill/getXhsCozeSkillData (a third‑party domain, not an official Xiaohongshu endpoint). Requiring an external aggregator API can be legitimate, but using an unvetted domain for all data collection is disproportionate to the stated purpose unless the README documents and verifies that service. No explanation or homepage is provided for that endpoint.
Instruction Scope
SKILL.md requires running the bundled script and mandates following references/core_workflow.md, but also mandates reading references/report_template.md when generating HTML — that file is not present in the package (missing file). The core workflow forbids showing raw data to users yet later requires listing 2–3 reference notes with full interaction data (titles, links, author, full interaction counts) — that is internally contradictory. The script will transmit user-provided keywords to an external host; SKILL.md does not explicitly disclose the external endpoint or how data is handled.
Install Mechanism
No install spec (instruction-only), so nothing is written to disk by an installer. However the package includes an executable Python script (scripts/fetch_xhs_trends.py) that will be executed at runtime. There is no package download/install risk, but executing bundled code that performs network I/O is still an active risk.
Credentials
The skill requests no environment variables or credentials (good), but the script sends user-supplied keywords and other parameters to an external service. Even without explicit credentials, this is a data‑exfiltration/privacy risk: user queries (which may include sensitive info) will be transmitted to onetotenvip.com. Additionally, the script disables TLS hostname checking and certificate verification and avoids sending SNI — these behaviors are unusual for a benign client and suggest attempts to bypass server/domain controls or monitoring.
Persistence & Privilege
The skill is not marked always:true, requests no system config paths, and does not declare persistence. It appears not to modify other skills or system-wide settings. The main privilege is runtime execution of the bundled script (normal for a code-including skill).
What to consider before installing
This skill's goal (generate Xiaohongshu copy) is plausible, but exercise caution before running it. Specific concerns: (1) the bundled script posts user keywords to an unverified third‑party domain (onetotenvip.com) rather than an official Xiaohongshu API; (2) the script intentionally disables TLS hostname verification and avoids sending SNI — unusual and potentially used to evade controls; (3) SKILL.md references a report_template.md that is not included and contains contradictory rules about showing raw data vs. listing full reference notes. Before installing or running: (a) ask the publisher to disclose and justify the external API, provide its privacy policy and uptime/ownership details; (b) ask why the code disables certificate checking and SNI; (c) request the missing references/report_template.md and clarification on the conflicting display rules; (d) avoid entering any sensitive or personal keywords until you trust the endpoint; (e) if you must test, run the script in an isolated sandbox with network monitoring to observe outbound requests, or replace the network call with a vetted data source or a local mock. If the publisher cannot justify the third‑party endpoint and the TLS bypass, do not use this skill with real user data.Like a lobster shell, security has layers — review code before you run it.
latestvk9714fdbgjzktr37tz3zx4aw7h84v2xr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
