Fanvue

v1.0.0

Manage content, chats, subscribers, and earnings on the Fanvue creator platform via OAuth 2.0 API.

4· 2k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Name/description, SKILL.md, api-reference and example code all consistently target Fanvue creator account management (posts, chats, media, subscribers, earnings). The requested OAuth scopes and API endpoints align with that purpose. However the registry metadata claims no required environment variables or primary credential while the SKILL.md and code explicitly require FANVUE_CLIENT_ID, FANVUE_CLIENT_SECRET, and FANVUE_REDIRECT_URI — a clear metadata mismatch.
Instruction Scope
The SKILL.md instructions and included example code limit actions to Fanvue API calls (auth flow, listing media, posts, messages, insights). There are no instructions to read unrelated local files, system config, or send data to third-party endpoints beyond Fanvue auth/api domains.
Install Mechanism
No install spec is present (instruction-only with example code). That minimizes install-time risk — nothing is downloaded or written by an installer. The code files are example helpers and API schemas; no build/install steps are declared.
!
Credentials
SKILL.md and the example code require FANVUE_CLIENT_ID, FANVUE_CLIENT_SECRET, and FANVUE_REDIRECT_URI and describe requesting sensitive OAuth scopes (offline_access, read:subscribers, read:insights, write:chat, write:post). Those are appropriate for the declared functionality, but the registry metadata incorrectly lists no required env vars/credentials. Because the skill needs confidential credentials (client secret) and will obtain access/refresh tokens that grant account-level actions (posting, messaging, reading earnings/subscriber lists), the mismatch in declared credentials is a meaningful red flag and warrants verification before granting secrets.
Persistence & Privilege
The skill is not marked always:true and does not request system-level persistence. It will operate via OAuth tokens (which grant account access), and the platform default allows autonomous invocation; that is normal for a skills integration. There is no evidence the skill modifies other skills or system configs.
What to consider before installing
What to check before installing/using this skill: - Provenance: the skill's source/homepage is missing and the owner id is unfamiliar. Prefer skills with a documented homepage or known publisher. Ask the publisher for a repository or contact info. - Metadata mismatch: the registry lists no required env vars, but SKILL.md and examples require FANVUE_CLIENT_ID, FANVUE_CLIENT_SECRET, and FANVUE_REDIRECT_URI. Confirm with the publisher why the manifest omits these and ensure the platform will prompt you to supply them securely. - Least privilege: only grant the OAuth scopes the agent truly needs. Scopes like offline_access (refresh tokens), read:subscribers, read:insights and write:* give broad access (read earnings/subscribers and create posts/messages). If you don't want the agent to send messages or post automatically, omit write scopes. - Credential handling: the examples use client_secret and exchange/refresh flows. Ensure the environment storing these secrets is secure and that tokens/refresh tokens are not logged or exported. Prefer confidential client flows when possible. - Autonomous actions: with valid tokens the skill can act on your account (post content, message subscribers, view earnings). If you will allow autonomous invocation, be comfortable that those actions are acceptable. Otherwise disable autonomous invocation or limit scopes. - Verify redirect/callback: when creating the OAuth app, set a redirect URI you control and verify the auth flow before handing over tokens. If you cannot verify the publisher or correct the metadata mismatch, treat the skill as untrusted and do not provide your Fanvue client secret or long-lived tokens.

Like a lobster shell, security has layers — review code before you run it.

latestvk975njwxqjm94dqqen5bhmqfws80ag65

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments