Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Sui Vibe

v1.0.1

W.A.L.V.I.S. - AI-powered knowledge manager. Save anything from Telegram — links, text, images. Auto-tag and organize with AI; store on Walrus decentralized...

0· 274·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description, the SKILL.md, and the included code (CLI, hook, fastpath plugin, web UI) are consistent with a Telegram knowledge manager that stores data locally under ~/.walvis and syncs to Walrus testnet. However the registry metadata says no required env vars while README/CLAUDE.md/bin/cli.js and SKILL.md expect an LLM API endpoint/key and optional Sui wallet info — a clear metadata mismatch. Also metadata.openclaw suggests installing an npm package 'walvis' while this repository contains the skill sources locally; that discrepancy is worth confirming before running 'npx walvis'.
Instruction Scope
Runtime instructions explicitly tell the agent to read and write files under ~/.walvis, to fetch pages using WebFetch and a real browser tool (open + snapshot + screenshot), and to upload screenshots via curl to walrus-testnet publisher endpoints. Those behaviors are coherent with a bookmarking tool, but they grant the agent broad network access (fetch arbitrary user-supplied URLs and upload binary screenshots to external endpoints) and instruct the agent to always prefer the browser tool — which increases the blast radius if misused.
Install Mechanism
There is no install spec in the registry entry, but the repository contains a CLI (bin/cli.js), package.json and package-lock.json and many JS/TS files — so installation will involve copying files and running npm in your environment or running 'npx walvis'. The code calls child_process (execSync/spawnSync) in places (installer detects Docker/OpenClaw) — expected for an installer but worth attention. No downloads from untrusted hosts are present in the manifest, but verify the npm package name and origin if you run 'npx walvis'.
!
Credentials
Registry metadata claims no required environment variables, yet the CLI and docs request an LLM API key/endpoint (llmEndpoint/llmApiKey / WALVIS_LLM_API_KEY) and optionally a Sui wallet address. The skill will prompt for and persist LLM credentials during setup and uses them for content analysis — requesting an LLM key is proportionate to the stated AI-analysis purpose, but the mismatch between declared requirements and actual code/installer is a red flag you should resolve. No unrelated secrets (AWS, GitHub, etc.) are requested.
Persistence & Privilege
The skill does not request 'always: true' and is user-invocable. It includes an OpenClaw message hook that rewrites messages (fast-path routing) and can auto-save bare URLs if manifest.autoSave is enabled; the fastpath plugin defaults to ON for new installs. This behavior (message rewriting/automatic saves and plugin that bypasses LLM for deterministic commands) is within the skill's purpose but is a privilege you should be conscious of because it changes incoming message content and can trigger automatic uploads/syncs.
What to consider before installing
What to check before installing: - Confirm where you'll run the installer: the repo includes code and an installer (bin/cli.js); prefer reviewing/inspecting the files locally before running any npx install. Do not blindly run 'npx walvis' unless you trust the npm package owner. - Expect to provide an LLM API key (llmApiKey / WALVIS_LLM_API_KEY). The registry claims no env vars, but the CLI and docs require this; ask the author how/where the key is stored (manifest or env) and avoid supplying high-privilege keys (use a scoped/test key if possible). - Be aware the skill will read/write ~/.walvis (manifest, spaces, media) and may upload screenshots and space blobs to walrus-testnet endpoints. If you plan to keep data private, do not run `/walvis sync` or enable uploads until you audit the code and configuration. - The skill instructs the agent to use a real browser tool to open arbitrary URLs and take snapshots — this is necessary for rich bookmarks but increases risk (drive-by content, JS execution, etc.). Run the skill in an isolated environment or container if you have sensitive data or are unsure. - The OpenClaw hook rewrites incoming messages and can auto-save bare URLs — if you do not want automatic behavior, set manifest.autoSave = false and disable fastPath or review the hook before enabling. - Review where the CLI/installer inspects Docker mounts and writes into OpenClaw config (it calls docker inspect / exec). If you run the installer on a machine with Docker, it may detect containers and host paths; verify these operations are acceptable in your environment. - If you want to proceed, audit where credentials are stored (manifest.json, openclaw.json) and prefer testnet/demo keys initially. If unsure, run the web UI locally in dev mode and test with dummy data before connecting your real LLM key or syncing to Walrus.
bin/cli.js:241
Shell command execution detected (child_process).
extensions/walvis-fastpath/index.js:66
Shell command execution detected (child_process).
scripts/smoke-walvis-scripts.mjs:13
Shell command execution detected (child_process).
extensions/walvis-fastpath/index.js:565
Environment variable access combined with network send.
scripts/smoke-fastpath-plugin.mjs:155
Environment variable access combined with network send.
skill/scripts/analyze.ts:77
Environment variable access combined with network send.
!
bin/cli.js:8
File read combined with network send (possible exfiltration).
!
extensions/walvis-fastpath/index.js:3
File read combined with network send (possible exfiltration).
!
scripts/smoke-fastpath-plugin.mjs:4
File read combined with network send (possible exfiltration).
!
skill/scripts/walrus-sync.ts:15
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk97665bsfd4afzc06d85dk9n198309e8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments