Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Website ScreenshotOne (by ScreenshotOne)

v1.0.0

Use this skill when you need to take website screenshots with ScreenshotOne using direct curl commands, save the result to a local file, or choose Screenshot...

0· 81·0 current·0 all-time
byDmytro Krasun@krasun
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description and the SKILL.md consistently describe taking screenshots via ScreenshotOne and show the exact curl commands needed — that purpose matches the instructions. However, the registry metadata claims no required environment variables while the runtime instructions explicitly require SCREENSHOTONE_ACCESS_KEY, which is an inconsistency.
Instruction Scope
Instructions are narrowly focused on building curl requests to api.screenshotone.com and saving results locally. They also document options like metadata_content, scripts, and storage: these are legitimate ScreenshotOne features but can return page contents or upload results to configured storage if a user enables them. The SKILL.md recommends passing the access_key in a query parameter; note that sending credentials in URLs can leak via logs or referer headers.
Install Mechanism
There is no install spec and no code files — this is instruction-only, which minimizes installation risk. Nothing is downloaded or written by the skill itself.
!
Credentials
The skill's instructions require SCREENSHOTONE_ACCESS_KEY, but the registry lists no required env vars or primary credential. That mismatch is a material omission. Beyond the access_key, no other credentials are requested in instructions; however, several request parameters (storage_endpoint, proxy, authorization, metadata options) can be used to move or disclose captured content, so the single access key should be treated as sensitive.
Persistence & Privilege
always:false (default) — the skill does not request permanent inclusion. The included agents/openai.yaml sets allow_implicit_invocation: true, which permits the agent to call this skill implicitly when eligible; that is normal but worth noting because it allows the agent to invoke screenshot captures without an explicit user command if policy allows it.
What to consider before installing
This skill appears to do what it says (build curl calls to ScreenshotOne), but there are a few practical risks and inconsistencies to weigh before installing: - The SKILL.md requires SCREENSHOTONE_ACCESS_KEY but the registry metadata does not declare any required env vars — confirm the skill owner and update metadata or refuse installation until the required credential is declared. - The examples pass the access_key as a query parameter. Query parameters (and generated URLs) can be logged or appear in Referer headers; prefer using a secure header-based flow or at least be aware of leakage risk when using sensitive URLs or shared environments. - The documented options include metadata_content and storage_* settings. If you enable metadata_content=true, the API can return page content (potentially sensitive). If you set storage_endpoint/storage_bucket, screenshots could be uploaded to arbitrary storage — ensure you control the destination. - Because this is an instruction-only skill with allow_implicit_invocation enabled, an agent could call it automatically when relevant. If you are concerned about automatic captures of sensitive URLs, disable implicit invocation or only use the skill in sessions where you explicitly permit it. What to do before installing: verify the skill owner (the registry owner id), insist the registry metadata be corrected to list SCREENSHOTONE_ACCESS_KEY as a required credential, and avoid using the skill with pages that contain sensitive data unless you control the ScreenshotOne account and any storage destinations. If you need more assurance, ask the publisher to change examples to use header-based auth or POST body auth to reduce URL leakage.

Like a lobster shell, security has layers — review code before you run it.

latestvk972bag1h8wx1gbxme16qwawgx84h1dd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments