GEDCOM Explorer

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: gedcom-explorer Version: 1.0.0 The Python script `scripts/build_explorer.py` itself appears benign, performing local file parsing and HTML generation without network access or suspicious system calls. However, the `SKILL.md` file, which is treated as an attack surface for prompt injection, contains an instruction in the 'Extending' section: 'send "On This Day" notifications via Telegram'. While the stated purpose of sending 'daily events' is benign, this instruction introduces a network communication capability for the AI agent that is not strictly necessary for the skill's primary function (generating a local HTML dashboard). This represents a risky capability that could potentially be leveraged for data exfiltration or other unauthorized actions if combined with a more targeted prompt injection.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run with the wrong paths or on an untrusted GEDCOM file, it can process private data and create or overwrite an output HTML file.

Why it was flagged

The skill is invoked through a local Python command that reads a user-specified GEDCOM file and writes an HTML output file. This is central to the stated purpose, but it does give the script local file read/write authority over the paths the user supplies.

Skill content
python3 scripts/build_explorer.py <input.ged> [output.html] [--title "Title"] [--subtitle "Subtitle"]
Recommendation

Run it only on GEDCOM files you intend to process, choose an output path you control, and keep a backup if writing over an existing HTML file.

What this means

Anyone who receives or can open the generated HTML may be able to view the family-history data embedded in it.

Why it was flagged

The generated HTML persists the GEDCOM's people, family relationships, dates, and places inside one portable file. That is disclosed and purpose-aligned, but GEDCOM data can be sensitive.

Skill content
extracts all individuals + families, computes stats, and embeds everything as inline JSON in a single HTML file
Recommendation

Treat the output HTML as private data; avoid sharing it publicly and consider redacting living people before generating a dashboard.

What this means

The dashboard and other files in the served directory could be reachable outside the intended browser session if the server is accessible on the local network.

Why it was flagged

The optional serving instructions start a simple web server for the output directory. This is user-directed, but it can expose files in that directory beyond just the dashboard depending on host and network settings.

Skill content
python3 -m http.server 8899
# Open http://localhost:8899/family-explorer.html
Recommendation

If you serve the file, use a dedicated output directory and bind to localhost, for example: `python3 -m http.server 8899 --bind 127.0.0.1`.

What this means

Users must rely on the packaged artifacts rather than an independently verifiable project page.

Why it was flagged

The skill does not provide an upstream source or homepage, so users have less external provenance information for the included Python script.

Skill content
Source: unknown
Homepage: none
Recommendation

Review the included script before first use if provenance matters, and run it in a directory containing only the files you intend to use.