Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Openclaw Mention Skill
v1.0.1Model-agnostic WhatsApp @mention skill for OpenClaw. Converts @Name, @Phone, @LID to blue clickable WhatsApp mentions with any AI model.
⭐ 0· 54·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included code and instructions: the package provides utilities to map names/phones to WhatsApp LIDs, an add-member CLI, and an installer that patches OpenClaw's deliver-reply and login code to produce correct mentions. Required binaries (node, bash, python3) are reasonable for the described tasks.
Instruction Scope
SKILL.md and README explicitly instruct the installer to patch OpenClaw core files to intercept outgoing messages and to read/write a local LID cache at /home/openclaw/.openclaw/workspace/LID_CACHE.json. That behavior is expected for the stated goal, but it does broaden scope to modifying application internals and reading/writing workspace files (including phone→LID mappings).
Install Mechanism
Installer is local shell script (install.sh) and embedded python edits; no external downloads or obscure URLs are used. The installer operates by locating files in /usr/lib/node_modules/openclaw/dist and editing them in place, creating backups. This is higher-privilege but matches the stated need to patch OpenClaw.
Credentials
The skill does not request environment variables, credentials, or network endpoints. It only reads/writes a local cache in the OpenClaw workspace and can install a memory guide. Required access to workspace and to the OpenClaw distribution directory is proportionate to its function.
Persistence & Privilege
The installer modifies OpenClaw core JS files and restarts the OpenClaw service to persist behavior across runs. This is coherent with the goal but is a privileged, persistent change to the platform; ensure you trust the patch and have backups before proceeding. always:false (normal).
Assessment
This skill appears to do what it claims (convert @Name/@Phone into WhatsApp LIDs) and does not request secrets or call out to external servers, but it patches OpenClaw core files and restarts the service — actions that require root or package-owner privileges and carry risk if the code is malicious or buggy. Before installing: (1) review install.sh and the exact inserted patch (the large _LID_PATCH_V10 block) line-by-line to ensure it only touches the intended files and does not add hidden network calls or credential reads; (2) verify the repository/source and maintainers, and prefer installing on a test instance first; (3) back up your OpenClaw installation (even though the script creates .bak files); (4) check the LID_CACHE contents for any sensitive phone numbers you don't want stored; (5) be prepared to run uninstall.sh to restore backed-up files — note uninstall leaves LID_CACHE.json and mention-guide.md in place. If you are uncomfortable with core-file patches, ask the maintainer for a non-invasive plugin approach or request the patch be upstreamed into OpenClaw so no local modifications are required.Like a lobster shell, security has layers — review code before you run it.
latestvk973xzdgd77t30z3xbydvx3g3x84bvca
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binsnode, bash, python3
