Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

PPT Reader

v1.0.0

Use when user sends a PPT/PPTX file or asks to read PowerPoint content. 适用于:读取PPT文件、解析演示文稿内容、提取幻灯片文本。

1· 125·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (reading PPT/PPTX content) align with the provided commands and workflow: unzip + sed/grep/tr to extract slide XML text. No unrelated services, credentials, or binaries are requested.
Instruction Scope
Instructions explicitly instruct reading files from /root/.openclaw/media/inbound/ and running shell commands (unzip, sed, grep, tr). This is coherent for processing uploaded PPTX files, but it does assume the agent can read that system path and will operate on any file placed there.
Install Mechanism
Instruction-only skill with no install spec and no code files. No packages or remote downloads are required, lowering risk.
Credentials
No environment variables, credentials, or external config paths are requested beyond the single inbound path used to find uploaded files—proportionate to the task.
Persistence & Privilege
Skill is not always-enabled and uses default autonomous invocation. It does not request persistent system changes or modify other skills' configurations.
Assessment
This skill is coherent for extracting text from .pptx files and doesn't ask for secrets or external installs. Before enabling, confirm you are comfortable with the agent reading files from /root/.openclaw/media/inbound/ (it will process any PPTX placed there). Ensure only intended/uploaded PPTX files are stored in that directory, and verify the host has standard utilities (unzip, sed, grep, tr). If you want stricter control, avoid allowing autonomous runs or require manual invocation when processing sensitive documents.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b02zvv2se9pspc79rzn0my983jgsv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments