Back to skill
Skillv1.0.1
ClawScan security
creator-finder · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 18, 2026, 4:37 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's code and instructions match its stated purpose (Playwright-based scraper for 小红书) but the package includes persisted authentication cookies and persistent checkpoint files and mentions optional external export (飞书) — these artifacts increase privacy and persistence risk and should be reviewed before running.
- Guidance
- This skill is functionally coherent for scraping 小红书, but take precautions before installing: 1) Inspect and remove config/cookies.json shipped with the skill — do not reuse unknown cookies; treat them as sensitive credentials. 2) Search the full code for any references to external endpoints (feishu, webhook URLs, requests.post/etc.) before running; if present, review what data would be sent. 3) Run first in an isolated/sandboxed environment or VM and with a throwaway 小红书 account to verify behavior. 4) If you must use your real account, delete the bundled cookies file and perform a fresh QR login so only local, user-controlled cookies are stored. 5) Consider throttling and obeying platform TOS — scraping may violate terms. 6) If you want lower risk, ask the maintainer for a version without pre-filled cookies and with explicit code comments for any external integrations. If you want, I can scan the remaining truncated portions of src/xhs_creator_finder.py for outbound network calls or feishu integration if you provide the full file.
Review Dimensions
- Purpose & Capability
- noteName/description match the code: it uses Playwright to open Chrome, log in (QR scan or cookies), search 小红书 and export results. The included dependencies and setup commands are appropriate for a browser scraper. One oddity: the release bundles a config/cookies.json containing session tokens — while cookies are functionally related (used to authenticate), shipping pre-filled cookies in a skill package from an unknown source is unexpected.
- Instruction Scope
- noteSKILL.md explicitly instructs opening Chrome, scanning QR to log in, and saving cookies; the code implements cookie loading/saving, checkpointing, and file exports. The instructions write data to local output/ and persist checkpoint and cookies; they do not (in the provided code) call external endpoints other than xiaohongshu.com. The skill therefore stays within its scraping purpose, but it has broad discretion to read/write local files (cookies, checkpoint, outputs).
- Install Mechanism
- okNo remote arbitrary download/install is present; dependencies are standard Python packages (playwright, pandas, openpyxl) and skill.json includes pip/playwright install steps — reasonable for this tool. No hidden download URLs or extract actions were found in provided manifests.
- Credentials
- concernThe skill requests no environment variables, which is appropriate. However, the package includes config/cookies.json containing many session cookies and tokens (e.g., id_token, web_session). Embedding live session cookies in a distributed skill is disproportionate and risky: anyone running the skill could inherit that account context, and those tokens are sensitive. Docs also mention an optional 'feishu' output target — check whether code actually implements outbound Feishu API calls before trusting the package.
- Persistence & Privilege
- noteThe skill persistently writes cookies, checkpoint.json, and output files into the skill workspace (config/ and output/). always is false and autonomous invocation is allowed (platform default). Persistent storage is reasonable for a scraper with checkpointing, but combined with bundled cookies it increases the risk surface (stolen/embedded cookies, long-lived checkpoint data).
