Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Url Reader
v0.1.1智能读取任意URL内容,支持微信公众号、小红书、今日头条、抖音、淘宝、天猫、京东、百度等中国主流平台,自动识别平台类型并提取核心内容。自动保存内容为Markdown,下载图片到本地。
⭐ 2· 1.2k·16 current·17 all-time
by@justao
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's declared purpose (read arbitrary URLs, extract core content, save Markdown and images) matches the included scripts: URL identification, Firecrawl/Jina/Playwright readers, and save_content. However the registry metadata claims no required environment variables or credentials while the code and SKILL.md document an optional FIRECRAWL_API_KEY and Playwright login-state use; that's an inconsistency. The code also requires installing Playwright/Chromium and optionally a Firecrawl client library — reasonable for the stated features but not reflected in the registry 'requires' section.
Instruction Scope
Runtime instructions and scripts direct the agent to: (1) call external reader services (Firecrawl, r.jina.ai), (2) launch Playwright/Chromium, (3) prompt the user to log in via a browser and save storage_state to data/wechat_auth.json, and (4) automatically save Markdown and download images to disk. These actions go beyond simple read-only queries: they persist authentication tokens (login state) and write files to disk using a hard-coded default path (/Users/ys/laoyang知识库/nickys/素材) shown in multiple places. The SKILL.md also instructs setting FIRECRAWL_API_KEY, which is not declared as a required env var in metadata.
Install Mechanism
There is no formal install spec, but SKILL.md instructs users to create a Python venv and pip install packages including 'firecrawl-py', 'requests' and 'playwright' and to run 'playwright install chromium' (which downloads browser binaries). This will write binaries and files to disk. The install sources are public package installs (pip) and Playwright's download — moderate risk and expected for this functionality; there are no unknown URL shorteners or arbitrary archive downloads in the install instructions.
Credentials
Registry metadata lists no required env vars, yet code and docs use FIRECRAWL_API_KEY (FIRECRAWL_API_KEY) for the preferred Firecrawl strategy. The skill also creates and stores Playwright 'storage_state' (WeChat login tokens) under the skill's data directory, which are sensitive credentials. The number and type of secrets (API key + browser auth state) are proportionate to the feature set, but the omission from the declared requirements and the automatic local persistence of login state are concerning and should be made explicit to the user.
Persistence & Privilege
The skill does not request 'always: true' and does not change other skills' configs. However it persists data to disk in two places: a hard-coded default output directory in the author's home path and a local data/wechat_auth.json for saved browser auth. Persisting auth tokens is normal for a reader that needs logged-in sessions, but the hard-coded user-specific path and lack of an opt-out or configurable default is problematic. Autonomous invocation is allowed (default), which combined with network access and file writes increases blast radius but is expected for this kind of skill.
What to consider before installing
What to consider before installing:
- The skill does what it claims (scrape many Chinese platforms and save Markdown/images) but is sloppy about metadata: it does require an optional FIRECRAWL_API_KEY (documented in SKILL.md) and Playwright, even though the registry lists no env vars. Treat the Firecrawl API key as sensitive.
- The skill will write files to disk: it uses a hard-coded default save directory (/Users/ys/laoyang知识库/nickys/素材). Edit the DEFAULT_OUTPUT_DIR in scripts/save_content.py and url_reader.py before use to point to a directory you control, or run the scripts from a confined/sandboxed environment.
- For sites that require login (WeChat, Taobao, etc.), the skill uses Playwright to launch a browser and will save browser storage_state (cookies/session tokens) to data/wechat_auth.json inside the skill directory. Those files contain authentication data — review and store them securely, or avoid using the Playwright login flow if you don't want to persist credentials.
- Installing Playwright will download Chromium binaries (playwright install chromium). Only proceed if you are comfortable with that and run the install in a controlled environment (virtualenv, container, or VM).
- The skill contacts external services: Firecrawl (requires API key, paid tiers) and r.jina.ai (free). If you do not trust Firecrawl, do not set its API key; the skill will fallback to Jina/Playwright but with degraded behavior.
- Because the repository owner and homepage are unknown, exercise extra caution. Recommended steps before installing: (1) edit DEFAULT_OUTPUT_DIR to a safe location, (2) confirm or remove automatic saving of wechat_auth.json if you do not want local credential persistence, (3) only provide FIRECRAWL_API_KEY if you trust the service and understand billing, and (4) run the tool inside a sandbox (container or VM) until you are comfortable with its behavior.
If the author updated the package metadata to declare FIRECRAWL_API_KEY as an optional required env var, and replaced the hard-coded output path with a configurable default or documented prompt, my assessment would move toward 'benign'.Like a lobster shell, security has layers — review code before you run it.
latestvk97c29pbganaa29jcmn4rkxm858129gg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
