Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

skill-to-mermaid

Converts data and diagrams into Mermaid syntax for easy visualization and flowchart creation.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 39 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (convert data to Mermaid) match the minimal footprint (no binaries, no env vars, no installs). Nothing requested appears disproportionate to the stated purpose.
!
Instruction Scope
SKILL.md is not human-readable text — it appears to contain binary/corrupted data. Because runtime instructions are missing or unreadable, we cannot confirm what the agent would be instructed to do. This prevents verification and could hide unintended or malicious behavior.
Install Mechanism
No install spec present (instruction-only). That is low-risk in itself and consistent with a simple conversion helper.
Credentials
The skill requests no environment variables, credentials, or config paths, which is proportionate for a conversion/formatting helper.
Persistence & Privilege
always is false and model invocation is allowed (platform default). There is no indication the skill requests persistent/system privileges or modifies other skills.
What to consider before installing
Do not install or enable this skill until the author provides a readable SKILL.md. The current SKILL.md appears binary/corrupted so you cannot verify what instructions the agent would run. Ask the publisher for a plain-text runtime instruction file, confirm there are no hidden install steps or network endpoints, and request a human-readable changelog or source. If you must test it, run it in a tightly sandboxed environment with no access to credentials or sensitive files. If the publisher cannot provide clear, inspectable instructions, treat the package as untrusted.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk974t3mf3nw8nn48wyj8ttgbhs835tj9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

b#e��o���E-SafeNet���LOCK������������%��]���"�gWn�m��������������������������������������������������������������������������������������������_��d4⌅���.�[��s�,��tqy����T��r�Cҧ�|����8�4+�����7��dWV��@�U�"��z{��f%q���c!��+@�N���峏,�+�d�n��1�BD�tfqk�)[I @��}���SvmGډ�|��4�Mk��c��A���(KT&f��)�K��t�?�_,O����W�)����r���N�Aw�=B�z���p~��� sD��^��6�‹ D��4ؒ��A@�(s�yM�;s�h����9:�*���) Xs-iQ�֋�/!X�Ԓq�~�S;Y�x��#4�l=�����ˀ�pz��m�Ƨ�f���9���+�&Lsb1��?P*ڪ�N�'1k��i�X�䵛���@�K{��G,����æ �O� ��r�lep��*�R�fc�¹���y"�hC"�L�q[��*%(�pTi���pޯe]俽�B+ �GV� V�:m=�7�� �%Hʵ��N[Km�Cr�%hMb��2���!�{e@�NH��N:Q���� &� ӻ��wx��Y�#�;�����,���^7l�E,���(��ٶ �J�E�sM��``\s�Ai��6 =v�ed�������t_5ť�B���a y�“� v��;MQ�j̵�N�26 7up�.@���r��J}�X8[�x�� ;�J5ݴ�=ST<��$�<e�k&U�N�ҍ����6����'�|F/y��@��/��]�\�U�� >R8B���I2���]ۅO��.^����zRI;C-��˿(��=I��ǐ��Z��o^�>�g���Dک�  �fǺ��:�B�cZ@1��$�)s���rM��&� �� ���&r 377Ū�Uv����3��$ k��3 �jL��9::��W�^�4��6D��<�7����uF�6$��.�2]��( "�YHf�ɎyůVb窦�X%����n��Y�����Y��9�@t�;l�������awa���J�'}��'�99���EF�EA e�R5<4�����%����B�x���ՎK��q[ [�z#���8���]�UL�s�@P�<\�}����B����̅J$�����0 ��Q�����{���Lv���p�к{Z<����握�We��C<+" @qj��Mŷ��.��i|�.�qψ#�՚.�E$����8=��-���£eQ�G0C>�����W�,)����a�azU0�Mp�8 i �2�C R8A���3�*)a�T�r�7�\D�UKҗ�|,?����i�K�x����p��50�#�͒��fj�F�L�lN�̋�����Vg�?�g����# �%̘�U��&0�6�^��_X����枋CN��$/����m�u��Xv�D���a��MU@�?�����5���:�*��Z�(�| ���|?��dІ&�v�R�G���/b����}'���l2����ZEt>Iޠ���(㖗�?�*#M���#���@_=�.��VV \(o{����Dq�ܫX���٠�E0#(���֤�}s5�~KUX�{�1RG֟\��R]�~,���gMfZ�X v���(��a�n6DW�e�� ��6 =v�H��8������nn4ӿ�y���iRY�Ο��ؘ�xxj�ǻ�߱����4���]fHA��W���-�\J�����Wv�N��Nf.~k�+��݋!���8��Պ����ev���}�����e!!��|ɵ҃9�:������ S'��p��������";� �ø���X0R8�^��>�z��R�ٝl_PV�2�9,N��)�m?F������اL{�>�%ꘪ�-B�=���U���O�Y���#l���ףe��6jꏓP�l<ㅅ��!�R��o�3��|*3�p�����t�X���w��n�t�O��| q+V��~��V!�(�~�/���i"���� n��ek��df!�Ж����G��H�������r���B�!���쨛��~z�v�Gҋ0��̺[w���& or�ߢ���q|G'�N�AU�b�"X�H�������='g�(Z}�Q�v��}��L�U \s�2B������S].Z6�� u�8����|���W7�I7�?s�a����: �}�x��pQz W]3D���l1J2]��W���w���Cb�~��"�K�������J��B]�7* �lR?-"'mv�+W�)�Vb!��6����f!��B.+W���JC����l�.���cia��8X}> ����E���(�h۔��t=���[6P�� ����bN�b�����ͅN� ����@��>B��z�T̋N����Q�H ��}n �3?ѭ�u������f9�����j�[Ø2�%�)����&�T�T�!��K��kM�9�P��+QVZ�D�0*��-�>��S�{'��ns%m�x ��?h��aIf0�‹�d�ˈ ֭Ƿ��9�bvG���m���Q�.�������͎lw��.��l\��Iɼip���&(B�����/{�(o[V�r�Eo5g��p8HYB�nbW��1�nF}�X(�����|H5��8&[B��s=���XbN�̪v�۝��U���'vv�Ĺ˽��ߊCA,;=��UkѺ�g;�����W������rM�����^� #���۔f��2 |hL5�� ���� �˔�b\0#㖗_�3�)����S�VRi�Xx�8����Ȝ��_dLJKѝ�d�� ���&7������@�ۮ(�3r��lJ�LGp竫��q#P&��Ei�� �la �����y�/��;��FH,z���� ����:X�H�x�Ւ��M ��w8���D^��x:䌅���t����-��#3v�s���U��~�@Ҭ�.��{U�R��t)=/ v��dö!�C�q�tN���=d�Գ�rl��|y��4G3n�̎�����������J�R��+���[�D״��栎�� 1�&�/zؔ8�cϵh/ں�)tfy�����g,U�CTLZ�=�~]^�Nʈ���]���<#z�3YQb��a/�l��+��2�>>+�$�О�T4�����XbN�̪Q�����I���4m�v7� [����[HP7;���'� NA�Ġ��ȓڲ�Mm���Jk.��l���T�'\��J���Wt�6��H B_S�¦LdLf�4=�mlՊ�����,U�� yo�@����q���f{Ae�@��)F:4k\���l�pwc� S�3�Pz��#��l64.��h,\�j�K=��\�Sp(���(Wp"dUs�?���4'�)���wP.k�kT� g��I�acp0��)�*s��^a�� ���� ��-M�?d3��L����m��.AX7�M�Js��d"���U�@��1��]_}��m�;�8�4����AJ�'��

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…