Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Gv Caller

v1.0.1

使用 Google Voice 自动拨打电话并播放 AI 生成的语音(TTS)或本地音频。

0· 101·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The code and docs consistently implement Google Voice dialing with audio injection via Puppeteer and a virtual microphone, which matches the advertised purpose. However, the skill metadata lists no dependencies while SKILL.md and the scripts require chromium, ffmpeg, puppeteer-core, and an OpenClaw TTS CLI — this is a mismatch.
!
Instruction Scope
SKILL.md instructs the user to place google_voice_cookies.json in the skill directory, but lib/engine.js reads cookies from a hardcoded path '/root/.openclaw/workspace/google_voice_cookies.json'. The engine also reads/writes files under /tmp (TTS outputs and screenshots) and expects an 'openclaw tts' CLI to exist; these file/CLI accesses are not declared in the skill's "Requirements" section and broaden the skill's scope unexpectedly.
Install Mechanism
There is no install spec (instruction-only install), which minimizes installation risk. But runtime requires Node.js modules (puppeteer-core) and native binaries (chromium, ffmpeg); these are not enforced by the registry metadata and must be installed by the user.
!
Credentials
No environment variables or config paths are declared, yet the code requires and reads a sensitive cookie file containing Google session credentials. The cookie path is hardcoded to a root-owned workspace location, which could give the skill access to credentials in a location the user didn't expect. Also the skill relies on an external 'openclaw tts' command and generated files under /tmp, none of which are declared.
!
Persistence & Privilege
always:false (normal), but the skill reads a cookie file from a shared-looking root workspace path: '/root/.openclaw/workspace/google_voice_cookies.json'. That hardcoded path could access credentials or artifacts created by other components or users on the host, which is a privilege concern even though the skill does not explicitly persist itself or alter other skills.
What to consider before installing
This skill does what it claims (automated Google Voice calling with injected audio), but there are several red flags you should resolve before installing or running it: - Protect your Google credentials: the engine reads a cookie file with account session cookies. Confirm where you will store google_voice_cookies.json and avoid putting it in shared/root workspaces. The code currently reads '/root/.openclaw/workspace/google_voice_cookies.json' (hardcoded) — ask the author to make this path configurable or change it to the skill directory before use. - Verify dependencies: you must install Node.js, puppeteer-core (and matching Chromium), ffmpeg, and provide the 'openclaw tts' CLI the script expects. The registry metadata does not declare these; ensure they are present and trustworthy. - Run in isolation: because the skill automates a real Google account and uses session cookies, test it in an isolated environment or with a throwaway Google Voice account to avoid accidental exposure or misuse. - Review and/or patch code: the hardcoded '/usr/bin/chromium' path and '/root/.openclaw/workspace/...' cookie location are brittle and surprising. Change these to configurable options (read from the skill's directory or arguments) and avoid requiring root paths. - Legal/ethical caution: automated outbound calling may be subject to local laws and abuse policies; do not use for harassment or fraud. If the author provides a fixed release that (a) declares required binaries/dependencies, (b) makes the cookie path configurable and documented, and (c) does not read root/shared workspaces by default, this would substantially reduce the concerns.

Like a lobster shell, security has layers — review code before you run it.

google-voicevk977fs6ann53zj4hrvamwqa33583dh4elatestvk972k40fmy1d5685bs6j51jqpx83cc30telephonyvk977fs6ann53zj4hrvamwqa33583dh4evoicevk977fs6ann53zj4hrvamwqa33583dh4e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments