Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

TikTok/Douyin 创作流水线

v1.1.0

TikHub API 多平台数据爬取工具,支持抖音/TikTok/B站等。当用户提到:(1) 爬取抖音/TikTok/B站视频或评论;(2) 获取用户信息/粉丝列表;(3) 批量下载无水印视频;(4) 抖音链接转文字(下载→音频→Whisper pipeline);(5) 调用 TikHub API。

0· 49·0 current·0 all-time
bykk.Tang@kk-kingkong
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name, description, SKILL.md and code align: the package calls TikHub endpoints, downloads videos, extracts audio, and runs Whisper/MLX-Whisper transcribes. The endpoints used (api.tikhub.io / .dev) and functions implemented match the stated purpose.
!
Instruction Scope
SKILL.md instructs running batch.py and the full pipeline; those are coherent. However the implementation launches external tools (ffmpeg, whisper) and in one code path constructs and runs a shell command via nohup with subprocess.run(..., shell=True). That creates a command-injection risk if filenames/paths are attacker-controlled or contain special characters. The skill also writes logs to /tmp and spawns background processes, which users should be aware of.
Install Mechanism
No install spec (instruction-only with code files) — low install risk. Minor mismatch: requirements.txt lists 'ffmpeg' (which is not a Python package) while SKILL.md correctly instructs installing ffmpeg via brew; this is a packaging inaccuracy but not an overt supply-chain issue.
Credentials
The skill requests no environment variables or external credentials in metadata. The code uses an API key (API_KEY global) and the SKILL.md instructs the user to obtain/set a TikHub API key — that matches purpose. No unrelated credentials or config paths are requested.
Persistence & Privilege
always is false and the skill is user-invocable/autonomous-invocation remains the platform default. The skill does spawn background Whisper jobs and writes logs to /tmp, but it does not request elevated or persistent platform-wide privileges or modify other skills.
What to consider before installing
This skill appears to implement what it claims (TikHub scraping, downloading, audio extraction, Whisper/MLX-Whisper transcription). Before installing or running it: - Review how you supply the TikHub API key — avoid hardcoding keys in the file; prefer passing via set_api_key at runtime or environment variables under your control. - The code uses subprocess with shell=True to launch background Whisper jobs (nohup). If you pass filenames or URLs containing untrusted characters, that could allow command injection. Only run the skill on files/inputs you trust or sanitize paths before use. - The skill spawns background processes and writes logs to /tmp; monitor for orphaned processes or large disk usage. - requirements.txt incorrectly includes 'ffmpeg' (not a pip package). Follow SKILL.md (brew apt-get or OS package manager) to install ffmpeg and the Python dependencies (requests, openai-whisper, mlx-whisper). - Consider inspecting the full set_api_key implementation (in scripts/tikhub.py) to confirm it does not persist secrets insecurely. - Legal/terms note: scraping/downloading videos and comments may violate service terms or local laws — ensure you have permission and are within terms of service. If you need to proceed but want to reduce risk: run the code in an isolated environment (container/VM), inspect or patch the subprocess usage to avoid shell=True (use list-argument subprocess.run without shell), and validate/sanitize all filenames and URLs before passing them to shell commands.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dsy9qmctcsaddsf1q06b20583swxp

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments