Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Meal Subsidy

v1.2.2

2号人事部餐补申请自动化。触发方式:"申请餐补"查昨天;"申请4月7日餐补"查指定日期(默认当年);"申请4月餐补"查整月批量申请(默认当年);"本周餐补"查本周批量申请。

1· 152·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's stated purpose (automating 2号人事部 meal-subsidy submissions) matches the script's behavior: it navigates the target HR site, reads attendance, screenshots, and fills/submits forms. However, the SKILL.md repeatedly references Selenium/ChromeDriver and a separate meal_month.py script, while the included script is a Playwright-based meal_subsidy.py and meal_month.py is missing. This mismatch is unexpected and reduces confidence.
Instruction Scope
Runtime instructions ask the user to start Chrome with remote debugging and to log in once; the script connects to that browser, scrapes attendance, takes screenshots, and submits forms. Those actions are within the claimed scope. Still, the skill will act with your logged-in browser session and perform submissions on your behalf, which is a high-impact operation and should be explicitly acknowledged by the user.
!
Install Mechanism
There is no install spec in the registry. SKILL.md instructs 'pip install selenium' but the actual code imports Playwright (playwright.sync_api) and PIL — installing Selenium alone is insufficient. The mismatch between declared dependencies and actual imports is a red flag: users may follow instructions and still fail to run the script, or worse, install unnecessary packages. The packaging doesn't declare playwright or how to install/prepare browsers (e.g., 'playwright install').
Credentials
The skill requests no environment variables or external credentials. The code optionally reads CHROME_PATH from env but does not require secrets. There are no obvious demands for unrelated credentials. Note: the script uses and persists a Chrome user-data-dir (Config.CHROME_DATA), which stores cookies and session state.
Persistence & Privilege
always is false and the skill is user-invocable. The script will create a user-data-dir for Chrome and a skill-local log and screenshots directory, persisting session cookies and artifacts on disk. While not an elevated platform privilege, persisting and reusing browser profile data means the script can act with your logged-in identity across runs — treat this as a privilege and review the user-data directory contents if concerned.
What to consider before installing
This skill appears to do what it claims (automate meal-subsidy submissions) but has several inconsistencies you should resolve before installing: - Mismatched docs vs code: SKILL.md tells you to install selenium and mentions meal_month.py, but the repository contains a Playwright-based meal_subsidy.py and no meal_month.py. The real dependencies likely include 'playwright' and 'Pillow'. Do not assume 'pip install selenium' is sufficient. - High-impact actions: the script connects to your Chrome user profile (or starts Chrome with a user-data-dir) and will submit forms with your logged-in session. Only run it with an account you trust to perform automated submissions, and preferably in a separate Chrome profile or test account. - Persistence: the script persists a Chrome debug profile and logs/screenshots in the skill folder; these may contain cookies and screenshots of internal pages. Inspect and control the user-data-dir path (Config.CHROME_DATA) if you want to limit persistence. - Missing files: the SKILL.md references meal_month.py (batch monthly operation) but that file isn't present. Ask the publisher for the missing script or full source before relying on batch features. - Dependency/install steps: update/install Playwright properly (e.g., pip install playwright; playwright install) and verify the code runs locally. Review the entire script source (the provided file was truncated in the package listing) to ensure there are no hidden network calls or unexpected endpoints beyond the HR domain and the local CDP port. If you still want to use it: run it in an isolated environment (separate Chrome profile or virtual machine), test in a non-production account, and review the complete script file(s) for any external uploads or hard-coded endpoints. If unsure, ask the publisher for a corrected SKILL.md and the missing meal_month.py and for a clear dependency list.

Like a lobster shell, security has layers — review code before you run it.

latestvk976qsnqemhwfb8wv8yhjefzdd84x2b7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments