科技投资日报

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The report workflow is coherent, but the skill uses local Feishu app credentials and raw API execution to send a PDF to a hard-coded Feishu recipient without declaring or scoping that access.

Before installing, verify and change the Feishu recipient, confirm the skill is allowed to use your Feishu app credentials, and review the PDF tooling dependency. Treat the generated trading guidance as informational rather than financial advice.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

65/65 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

When invoked or scheduled, the skill may send files/messages through the user's Feishu app without an obvious recipient review step.

Why it was flagged

The skill tells the agent to use raw exec with direct Feishu API calls for an account action, rather than a clearly scoped messaging tool or a user-confirmed send workflow.

Skill content
“步骤2:上传并发送,用 exec 执行以下 Python 脚本” ... requests.post("https://open.feishu.cn/open-apis/im/v1/messages?receive_id_type=open_id", ...)
Recommendation

Use a scoped Feishu/message tool where possible, require explicit recipient confirmation, and avoid raw exec for account actions unless the user has reviewed the exact script.

What this means

The skill can act through the user's Feishu tenant/app credentials and may deliver the report to a recipient the user did not configure.

Why it was flagged

This reads local Feishu app credentials and sends to a hard-coded Feishu open_id, while the registry metadata declares no required credentials or config paths.

Skill content
cfg = json.load(open("/root/.openclaw/openclaw.json"))["channels"]["feishu"]; app_id, app_secret = cfg["appId"], cfg["appSecret"]; user_id = "ou_159cbb6a3791ff5a98f3a2a4b38e7d4c"
Recommendation

Declare the required Feishu credential/config path, make the recipient configurable, remove hard-coded open_ids, and document the minimum Feishu permissions needed.

What this means

The PDF step may fail or may run code from an unreviewed external skill installation.

Why it was flagged

The instructions depend on a converter script from another skill path that is not included in this skill's manifest or declared in the install requirements.

Skill content
bash /root/.openclaw/workspace/skills/md2pdf-weasyprint/scripts/convert-weasyprint.sh /tmp/tech-invest-YYYYMMDD.md /tmp/tech-invest-YYYYMMDD.pdf
Recommendation

Declare and pin the PDF dependency, or use the included PDF conversion script with clearly listed Python/package requirements.