Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

SEO Backlink Submitter

v1.0.0

Batch submit websites to AI tool directories and SEO directories to earn backlinks. Use when: user says "submit site to directories", "SEO backlinks", "submi...

0· 45·0 current·0 all-time
byclaw0x@kennyzir
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description align with the included scripts: Playwright-based form-filling and aiohttp checks for directories. The provided directories list and automation code match the claimed purpose. Minor mismatches: there is a scripts/submit_to_directory.py file that contains only '404: Not Found' (unused) and targets/README.md suggests a --target CLI option that the main script does not implement. These inconsistencies suggest sloppy packaging but not necessarily malicious intent.
!
Instruction Scope
SKILL.md instructs installing Playwright and running the provided scripts which is consistent. However, check_directory.py explicitly disables SSL verification (aiohttp request with ssl=False), which is unnecessary for simple directory detection and weakens transport security (allows MITM). The automation will programmatically fill and submit forms across many sites — this is coherent with the stated purpose but also enables mass unsolicited submissions / spam and may violate target sites' terms of service or trigger captchas/rate limits. The skill does not handle captchas, credentialed sites, or legal/terms checks, and it offers no safeguards beyond a small delay.
Install Mechanism
There is no registry install spec (instruction-only skill), and SKILL.md instructs the user to pip install playwright and run its installation step. That's expected for a Playwright-based tool. Nothing in the registry installs arbitrary third-party binaries, but following the SKILL.md will download Chromium via Playwright's installer — normal but networked.
Credentials
The skill requests no environment variables or credentials and does not access system config paths. That is proportionate to its purpose. It still asks the user to supply site data (name, email, URL) at run time; no hidden credential requests were found.
Persistence & Privilege
always is false and the skill does not request persistent privileges or modify other skills or system-wide settings. It writes local JSON result files only. Autonomous invocation is allowed by default but not combined with other privileged requests.
Scan Findings in Context
[aiohttp_ssl_false] unexpected: check_directory.py sets ssl=False on aiohttp requests, disabling TLS verification. This is not required for directory detection and reduces transport security (MITM risk).
[submit_to_directory_placeholder] unexpected: scripts/submit_to_directory.py contains only '404: Not Found' and appears to be a placeholder or accidental file; batch_submit.py implements submission logic itself. The unused placeholder is an incoherence in packaging.
[cli_flag_mismatch] unexpected: targets/README.md documents running python scripts/batch_submit.py --target <file>, but batch_submit.py accepts --directories and --site; the README and SKILL.md examples differ from the script's actual CLI parameters.
[automation_form_fill_clicks] expected: Playwright-based form detection, filling, and clicking (including JS click) are expected for automated submissions, but they also enable bulk/scraping/spam behavior and should be used with caution.
[playwright_install_instruction] expected: SKILL.md correctly instructs installing playwright and Chromium; that is expected for the code to run.
What to consider before installing
This skill appears to implement automated, browser-driven submission to many directories which matches its description, but there are some red flags you should consider before running it: - Transport security: check_directory.py disables SSL verification (ssl=False). Remove or change this before running to avoid MITM risk. - Packaging inconsistencies: a submit_to_directory.py file is just a '404' placeholder and the README references a --target option the main script doesn't accept. Expect to edit/fix CLI and file issues. - Abuse and legal risk: the tool automates mass submissions. Using it at scale can violate sites' terms of service, trigger captchas, get your IP blocked, or be considered spam. Only submit to sites where you have permission and comply with their rules. - Operational cautions: the scripts don't handle captchas, login flows, or multi-step submissions. They may produce partial results or require manual intervention. Review and test against a small, benign list first. - Safe execution: run the tool on an isolated machine or container, use your own contact email, throttle submissions, and inspect saved JSON results locally. Review and remove the ssl=False line, fix the CLI mismatches, and delete or replace placeholder files before trusting this skill. If you want higher confidence, ask the publisher for: corrected README/CLI, justification for ssl=False, and a cleaned package without placeholder files. If you cannot trust the source, prefer reimplementing the minimal functionality you need or use a vetted tool.

Like a lobster shell, security has layers — review code before you run it.

latestvk978hyfvzdtds447znq36hsgbs84sn8t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments