Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

dingtalk mailbox

v1.0.0

钉钉邮箱访问skill,使用mcporter调用钉钉邮箱MCP服务。支持查询可用邮箱列表、搜索邮件(类KQL表达式)、获取邮件详情、发送邮件。适用于需要通过AI助手管理钉钉邮箱的场景,如查询邮件、自动回复、邮件归档等。

0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The declared purpose (accessing DingTalk mailbox via MCP to list/search/get/send mail) matches the SKILL.md instructions which use mcporter and the MCP StreamableHttp URL. The core capabilities are coherent with the description.
!
Instruction Scope
The SKILL.md instructs the user/agent to run commands (npm install -g mcporter, mcporter config add, mcporter call ...) and to place the MCP 'url' token in a config file (~/.mcporter/mcporter.json). The skill thus expects filesystem writes and network access to the MCP URL and handling of a secret token. The metadata did not declare these config paths or token handling requirements.
!
Install Mechanism
There is no install spec in the registry, but the instructions require running `npm install -g mcporter` (a global npm install). That is an implicit install mechanism not captured in metadata; global npm installs can modify system state and require privileges. The mcporter package source is not verified in the manifest.
!
Credentials
No required environment variables or primary credential are declared, yet the skill requires the user to obtain and configure an MCP Token (the StreamableHttp URL) and save it to a config file. The metadata omits required config path and secret handling; this is an inconsistency and increases the chance of accidental secret exposure.
Persistence & Privilege
The skill does not request always:true and is user-invocable only. However, the instructions encourage a global npm install (system-level change) and creation of a config file in the user's home directory — these have persistence implications that are not declared in the registry metadata.
What to consider before installing
This skill appears to do what it says (manage DingTalk mailbox via the MCP API), but the SKILL.md requires you to install an external tool (mcporter) globally and to store an MCP token (StreamableHttp URL) in ~/.mcporter/mcporter.json — none of those requirements are declared in the skill metadata. Before installing or running: 1) Verify the mcporter npm package source and its authenticity (check the npm page, GitHub repo, and maintainers). 2) Avoid doing a blind `npm install -g` as it modifies system state; consider installing in a container or virtual environment first. 3) Treat the MCP 'url' as a secret; understand where mcporter stores it and whether it is encrypted. 4) Ask the skill author to update the registry entry to declare required binaries (npm/node/mcporter), required config paths, and the need for a secret token. 5) If possible, test in an isolated account/environment and audit network calls made by mcporter. If you can't verify mcporter or the token handling, consider this skill suspicious and avoid providing production credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk974ec9vngf8850d2e8788wfnd83p2cz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments