Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
DesignKit SKU 套图生成器
v1.1.0AI 图片处理与电商商品图生成技能包(美图设计室 DesignKit)。 支持抠图去背景、透明底、AI 变清晰/画质修复、商品主图与 Listing 套图生成; 根据用户意图路由到 designkit-edit-tools 与 designkit-ecommerce-product-kit。
⭐ 0· 39·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description match the included code: image editing and ecommerce product image generation. However the package requires an API key (DESIGNKIT_OPENCLAW_AK) and contains an SKU pipeline that connects to a database (psycopg2 + DB_ env vars). The registry metadata shown at the top claimed no required env vars, but claw.json and SKILL.md require DESIGNKIT_OPENCLAW_AK and the SKU script expects DB credentials — a clear metadata mismatch.
Instruction Scope
Runtime instructions route the agent to run shell/Python scripts (run_command.sh, run_ecommerce_kit.sh, sku_to_ecommerce_kit.py). Those scripts perform network calls to external DesignKit APIs, upload images, and the SKU script will attempt to load .env files from specific local paths and connect to a Postgres DB. The SKILL.md promises conversational, limited questioning, but the code will read local .env files and environment variables not declared up-front — scope creep relative to a simple 'image edit' skill.
Install Mechanism
No install spec (instruction-only distribution) — low friction to install, but code files are included and expect runtime dependencies (python3, psycopg2). There is no declared install step for psycopg2 or other deps, so runtime failures or hidden dependency installation may occur.
Credentials
Asking for DESIGNKIT_OPENCLAW_AK is expected. But the SKU pipeline and scripts also read DB credentials (DB_HOST/DB_USER/DB_PASSWORD etc.) and will auto-load .env files from other projects' paths by default, which can expose unrelated secrets. Additionally, request-logging is enabled by default and the scripts construct curl logs including the X-Openclaw-AK header — this can leak the API key into stderr/logs unless explicitly disabled.
Persistence & Privilege
Skill does not request always:true and does not modify other skills. The package requests network/filesystem/shell permissions (in claw.json) which are reasonable for this functionality, but combined with automatic local .env loading and DB access it increases blast radius.
What to consider before installing
Key things to consider before installing/using this skill:
- Metadata mismatch: the registry summary showed no required env vars, but the skill and scripts require DESIGNKIT_OPENCLAW_AK and the SKU flow may require DB credentials. Treat the DESIGNKIT_OPENCLAW_AK as mandatory for API calls.
- Sensitive local access: the SKU pipeline (scripts/sku_to_ecommerce_kit.py) will try to load .env files from other workspace paths and connect to a Postgres DB using DB_* env vars if present. If you don't intend to expose your database to this skill, do not run the SKU flow or ensure those .env files/DB creds are not present.
- Potential credential leakage: by default request logging is enabled and the scripts print curl-style requests (including X-Openclaw-AK) to stderr. If you must use this skill, set OPENCLAW_REQUEST_LOG=0 (or otherwise audit/redirect logs) to avoid leaking your API key to logs or shared consoles.
- Missing dependency handling: the scripts expect python3 and psycopg2; there is no install spec, so be prepared to install dependencies and review the scripts before execution.
- Audit the code: since the source/homepage is unknown and the repo runs shell/python that access network and local files, inspect scripts (especially sku_to_ecommerce_kit.py and run_command.sh) before giving it secrets or running it in an environment with sensitive .env files.
If you want to proceed safely: (1) set OPENCLAW_REQUEST_LOG=0 before invoking, (2) only export DESIGNKIT_OPENCLAW_AK when needed and avoid running the SKU pipeline unless you explicitly provide DB credentials on purpose, (3) run in an isolated environment/container or with logs redirected, and (4) ask the publisher for an official source/homepage and a clear list of required env vars and dependencies.Like a lobster shell, security has layers — review code before you run it.
latestvk97cc2zhgg76djm2wdy65yp2gx84514j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
