Back to skill
Skillv1.0.1

ClawScan security

intelligent-diagnosis-skill_test · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 29, 2026, 8:49 AM
Verdict
suspicious
Confidence
high
Model
gpt-5-mini
Summary
The skill is labeled as a 'domain test' but its runtime instructions call an internal merchant API and read a local config file (~/.openclaw/username) that was not declared — this mismatch could lead to unexpected data access or leakage.
Guidance
This skill's name says 'domain testing' but its instructions perform a merchant lookup using an internal Kuaishou API and read your local ~/.openclaw/username file without declaring that requirement. Before installing or enabling it, ask the publisher to: (1) explain why a domain-test tool needs access to ~/.openclaw/username and the merchant API; (2) declare any required config paths or credentials explicitly; (3) change the flow so the user supplies the username at runtime (rather than silently reading a local file) if that is necessary; and (4) provide a clear privacy/data-use statement and the exact endpoint being called. If you don't trust the publisher or the internal endpoint, do not enable this skill and consider running it in a sandboxed environment or asking for the SKILL.md to be corrected so purpose and instructions align.

Review Dimensions

Purpose & Capability
concernName/description indicate 'domain test' but the SKILL.md only documents looking up a merchant by name via an internal Kuaishou merchant API (merchant-lego.corp.kuaishou.com). The required action (merchant lookup) does not match the skill's stated purpose and suggests the manifest is mislabeled or the functionality is different from the advertised purpose.
Instruction Scope
concernRuntime instructions tell the agent to read a local config file (~/.openclaw/username) for a username and to POST that username and a parsed sellerName to an internal HTTP endpoint, then return the raw HTTP response to the user. Reading an undeclared local file and transmitting its contents to an external/internal service is scope creep and may expose sensitive local data.
Install Mechanism
okNo install spec and no code files; instruction-only skills have a lower disk/write risk. The security surface is the SKILL.md runtime instructions themselves.
Credentials
concernThe skill accesses a local configuration path (~/.openclaw/username) but does not declare any required config paths or credentials. Requesting local credentials (even just a username) without declaring them or explaining why is disproportionate and unexpected for a 'domain test' skill.
Persistence & Privilege
okalways is false and there's no indication the skill modifies other skills or requests permanent system-wide privileges. Autonomous invocation is allowed by default but does not by itself change this assessment.