Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Misskey
v1.0.2Misskey API integration for posting notes and uploading media to Misskey/Fediverse instances. Use when users want to post to Misskey, upload images, or inter...
⭐ 0· 62·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description (Misskey posting and uploads) matches the included scripts (post, upload, delete, whoami) and the API endpoints they call.
Instruction Scope
Runtime instructions and scripts only reference MISSKEY_HOST, MISSKEY_TOKEN, files provided by the user, and standard API endpoints. They do not attempt to read unrelated system files. However, upload.sh builds a curl command string and uses eval to run it (unnecessary and risky if arguments are malicious), and post.sh/whoami.sh call python3 for JSON parsing—so the agent will invoke network calls and spawn local processes.
Install Mechanism
No install spec (instruction-only with included scripts); nothing is downloaded or written by an installer. This is low-install risk.
Credentials
The skill actually requires MISSKEY_HOST and MISSKEY_TOKEN (and implicitly curl and python3) to function, but the registry metadata lists no required env vars or binaries. That mismatch is an incoherence the user should be aware of. The use of a default HOST (https://maid.lat) if MISSKEY_HOST is unset means actions could be sent to that instance unintentionally.
Persistence & Privilege
The skill does not request permanent/always presence, does not modify other skills or agent settings, and has normal autonomous-invocation settings.
What to consider before installing
This skill implements exactly what it says (posting, uploading, deleting, whoami) but the package metadata omitted required environment variables and expected binaries. Before installing: 1) be prepared to set MISSKEY_HOST and MISSKEY_TOKEN (the scripts default to https://maid.lat if you forget); 2) ensure curl and python3 are available; 3) inspect or replace upload.sh's use of eval (it can be exploited if used with untrusted input) — a safer direct curl invocation is preferable; 4) don't expose a high-privilege token: create a token with minimal permissions and never commit it to version control; and 5) if you require stronger assurance, ask the publisher to update the registry metadata to declare MISSKEY_HOST/MISSKEY_TOKEN and required binaries, and to remove eval usage.Like a lobster shell, security has layers — review code before you run it.
fediversevk970ynfj5bmpynceft3eyz68fn83dqaslatestvk970ynfj5bmpynceft3eyz68fn83dqasmisskeyvk970ynfj5bmpynceft3eyz68fn83dqassocialvk970ynfj5bmpynceft3eyz68fn83dqas
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
