Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Flight Price Advisor with Trend Chart for developer

v1.0.0

Embed interactive flight price trend charts into AI responses. Requires SerpAPI key for real-time data. Use when users want to visualize 60-day price history...

0· 35·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The component and UI code (React/HTML) match the stated purpose of rendering a 60-day flight price trend. Requiring node makes sense for the provided server snippets and demo. However, the registry metadata lists no required credentials while SKILL.md and the references repeatedly instruct configuring a SerpAPI API key (and even show an example config that includes an OpenAI key and flyai key). That mismatch (declared requirements: none vs runtime instructions: needs SerpAPI and optionally other API keys) is inconsistent and should be clarified.
!
Instruction Scope
SKILL.md and IMPLEMENTATION_STATUS.md include server-side instructions to auto-collect price snapshots on every flight search, write JSON files to price/data/price-history, and set up a cron job to poll popular routes. Those actions go beyond a pure front-end embeddable component: they persist user queries/search results and perform periodic external API calls. While coherent with 'build historical data', this has privacy/operational implications (data retention, frequency of outbound calls, storage location) that the skill metadata doesn't surface.
Install Mechanism
There is no automatic install spec — the skill is instruction-and-code only. No remote downloads or installers are invoked by the registry metadata, which lowers supply-chain risk. The included files are static and local (React/HTML plus docs).
!
Credentials
The package metadata declares no required env vars, yet the docs/instructions require a SerpAPI API key (and several docs show a config.json containing serpapi.apiKey, openai.apiKey, and flyai.apiKey). Requesting or recommending storing an OpenAI key or other credentials in the same project config is unnecessary for a chart component and is disproportionate. The skill also instructs creating local storage of search results, which implies access to potentially sensitive data. The credential handling approach (put keys into price/config.json in repo) is risk-prone.
!
Persistence & Privilege
The skill recommends adding server endpoints and filesystem writes (storePriceSnapshot, price-history JSON files) and a cron job to collect route data. That gives the skill persistent local footprint and ongoing outbound access to SerpAPI. While not using always:true or other special platform privileges, these persistent behaviors increase blast radius and should be approved consciously by the operator.
What to consider before installing
This skill appears to implement the charting functionality it claims, but there are important inconsistencies and operational risks to review before installing or enabling it: 1) Credentials: The registry lists no required environment variables, yet the SKILL.md and docs require a SerpAPI key (and example config files reference OpenAI and flyai keys). Do not commit API keys into repo files (price/config.json) — prefer environment variables or a secrets vault. Remove any unnecessary keys (e.g., OpenAI) from shared config if they are not required. 2) Persistent data collection: The project suggests adding server code to store every flight search into price/data/price-history and to run scheduled collectors. That will persist user search results and increase outbound API usage and storage. Confirm retention policies, where files are stored, access controls, and legal/privacy considerations before enabling. 3) Cron and rate limits: If you enable automated collection, verify SerpAPI quotas and costs and throttle collection to avoid accidental overuse. 4) Scope-check the code: Review the server snippets and any omitted code carefully for endpoints, secrets handling, or unexpected network calls. Ensure the skill only calls SerpAPI (or other intended APIs) and does not post data to unknown external endpoints. 5) Hardening suggestions: store keys in environment variables or a secrets manager; do not check config files with keys into version control; restrict the data directory permissions; add logging and retention limits; consider requiring explicit opt-in before any data collection starts. If you need, I can: (a) list exact files/lines where credentials are referenced, (b) suggest safer config patterns and example env-var based configs, or (c) produce a checklist for reviewing the server-side snippets before deployment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fpnh2bbzww64n3sqzn6bj59840yrx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📈 Clawdis
Binsnode

Comments