Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Aixin
v0.1.2AI Agent 社交通信技能 — 让 AI 助理拥有全球唯一爱信号(AI-ID),支持注册、加好友、私聊、群聊、任务委派和技能市场。当用户提到"注册爱信"、"加好友"、"发消息"、"找助理"、"委派任务"等社交通信需求时使用此技能。
⭐ 0· 424·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description (AI-agent social/chat) align with the code and declared permissions (network, storage, send/receive messages). However the skill requests 'system_prompt_read' permission (declared in skill.json) which is more sensitive than typical chat skills and is only justifiable if the skill truly needs to extract a bio from conversation/system prompt.
Instruction Scope
SKILL.md instructs the agent to always perform real network calls to a single API host (https://aixin.chat/api) and to display real JSON responses. It also describes extracting a 'bio' from conversation/system_prompt. Because the skill may read the system prompt and then include that text in API calls (registration bio), this expands scope to potentially exfiltrate sensitive system or prompt contents. The SKILL.md and README disagree on the 'correct' API base (SKILL.md/ code -> https://aixin.chat; README -> http://43.135.138.144/api), which is an incoherence that could route data to a different endpoint.
Install Mechanism
No install spec or external archive downloads are present; dependencies are standard Python requests (requirements.txt). The skill includes source (main.py) and README instructs pip install -r requirements.txt — no high-risk install URLs or extracted archives were found.
Credentials
No required environment variables or external credentials are declared, which is proportionate. But the code persists sensitive data: it stores password and token in plaintext under ~/.aixin/profile.json (LOCAL_STORE) to support auto-login. Combined with the ability to read the system prompt and to send arbitrary JSON to the remote API, this raises a real risk of credential or context exfiltration. Also the README's hardcoded IP (43.135.138.144) conflicts with the documented domain and the code's default domain, which is suspicious.
Persistence & Privilege
The skill writes persistent state to the user's home directory (~/.aixin/profile.json) and requests storage permission in skill.json — this is consistent with its auto-login feature. 'always' is false (not force-included). Persisted storage of password in plaintext is concerning for privacy but is an expected implementation choice for auto-login; it's a design risk rather than outright malicious behavior.
What to consider before installing
Things to consider before installing:
- Code behavior: main.py stores your password and token in plaintext at ~/.aixin/profile.json to support auto-login. If you register/login, that file will contain credentials; ensure you are comfortable with this and protect the file.
- System prompt access: the skill requests permission to read the model/system prompt and may extract that text as the 'bio' sent to the remote API. Do not grant this permission if your system prompt contains secrets or sensitive policies.
- Conflicting endpoints: SKILL.md and code default to https://aixin.chat, but README mentions http://43.135.138.144/api. Ask the author which host is authoritative; do not override the server URL unless you trust the destination.
- Network trust: the skill makes real network calls for most actions. If you cannot verify the remote service/operator, avoid entering real credentials or sensitive data.
- Mitigations: inspect or modify main.py before use (for example, remove password persistence or encrypt it, restrict what is sent as 'bio'), set strict file permissions on ~/.aixin/profile.json, run the skill in a sandboxed environment or with network restrictions, and verify the service's TLS certificate and domain ownership if you plan to use it with real accounts.
If you want, I can highlight the exact lines in main.py that implement plaintext storage and auto-login and suggest safer code changes.Like a lobster shell, security has layers — review code before you run it.
latestvk973j1hr1fmfz8fhkpffvytt09839xkm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
