Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

discord voice memo upgrade

v1.0.0

Provides a patch for Clawdbot fixing TTS auto-replies on inbound voice memos by disabling block streaming to ensure final payload reaches TTS pipeline.

0· 1.6k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The files, README and SKILL.md consistently describe a small core change: detect inbound audio and set disableBlockStreaming so the final payload reaches the TTS pipeline. The included patch files modify the exact dist files named in the documentation; nothing unrelated (e.g., cloud provider credentials, unrelated system hooks) is requested or included.
!
Instruction Scope
Runtime instructions tell you to overwrite files inside node_modules/clawdbot/dist and restart Clawdbot — that is consistent with a core patch but is intrusive. The patched code emits verbose console.log debug messages that include message bodies (ctx.Body slice) and prints a portion of API keys; this causes sensitive user content and credential fragments to be written to process logs. SKILL.md acknowledges debug logging should be removed for production, but the provided patch as-is directs the agent/operator to install code that will log secrets.
Install Mechanism
No remote install or download is used — the skill is instruction-only and bundles the patch files for manual copy. That lowers supply-chain risk (no arbitrary URL downloads), but the installation requires write access to node_modules and manual replacement of compiled dist files, which is an operational risk and can be error-prone.
!
Credentials
The package does not request external environment variables, which is reasonable. However, the code reads Clawdbot config/prefs and API key fields (OpenAI/ElevenLabs/etc.) and then logs their status — including printing the first 8 chars of an API key — which risks credential exposure in logs. Reading Clawdbot session store and prefs is within scope for TTS detection, but logging those values is disproportionate to the stated fix and creates a data-leak risk.
Persistence & Privilege
The skill does not request elevated platform privileges and 'always' is false. It does, however, instruct modification of compiled dist files inside the installed Clawdbot package; this change persists until reverted and may be overwritten by updates. The package does not modify other skills' configs or agent-wide settings beyond the targeted dist files.
What to consider before installing
This package is a focused core patch that appears to do what it says, but do NOT apply the provided patch directly to a production instance as-is. Actionable steps: - Inspect the two patch files yourself and verify no unexpected network calls or hardcoded endpoints exist. - Remove or convert the console.log debug lines before applying to any environment that contains real user data or secrets (dispatch-from-config.js logs message bodies; tts.js logs provider and partial API key values). - Back up the original dist files (SKILL.md shows backup commands) and test in an isolated/staging instance first. - Prefer submitting the minimal logical change (disableBlockStreaming: ttsWillFire) as a PR to upstream Clawdbot rather than repeatedly patching compiled dist files locally. - After applying, monitor logs for accidental leaks and ensure any logged API key fragments are not retained in centralized logs. If you want, I can point out the exact console.log lines to remove or produce a sanitized patch that strips debug logging before installation.

Like a lobster shell, security has layers — review code before you run it.

discordvk97cvb5efqrtnygxp442mcgnr9802yrqindicatorsvk97cvb5efqrtnygxp442mcgnr9802yrqlatestvk97cvb5efqrtnygxp442mcgnr9802yrqstablevk97cvb5efqrtnygxp442mcgnr9802yrqvoice memovk97cvb5efqrtnygxp442mcgnr9802yrq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments