圆周率查询 - 即刻数据

PassAudited by VirusTotal on May 9, 2026.

Overview

Type: OpenClaw Skill Name: jike-pi-query Version: 1.0.0 The skill is a legitimate utility for querying digits of Pi or finding the location of specific number sequences using the jikeapi.cn API. The Python script (scripts/pi_query.py) follows security best practices by using standard libraries, validating input ranges, and properly encoding URL parameters. There is no evidence of data exfiltration, malicious execution, or prompt injection.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may try this skill for non-pi questions and return irrelevant or failed results.

Why it was flagged

The skill is implemented only for pi digit/location queries, so mentioning date or market queries is broader than the actual capability and could lead to irrelevant invocation.

Skill content
适用场景:用户询问相关数据查询、日期查询或行情查询时使用。
Recommendation

Use this skill only for pi digit/location questions; the publisher should narrow the description to match the implemented functionality.

What this means

Your Jike API key is used for outbound API requests; if an untrusted API base URL is configured, the key could be sent somewhere other than the default provider.

Why it was flagged

The script sends the configured AppKey as a query parameter to the Jike API by default, and also allows the base URL to be overridden through an environment variable.

Skill content
API_BASE_URL = os.environ.get("JIKE_API_BASE_URL", "https://api.jikeapi.cn").rstrip("/") ... urllib.parse.urlencode({**params, 'appkey': appkey})
Recommendation

Store the AppKey in the intended environment variable, avoid passing secrets on the command line when possible, and do not set JIKE_API_BASE_URL unless you trust the endpoint.