Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

inquiry analyzer

v1.0.2

阿里巴巴询盘分析技能 - 分析指定时间窗口内的询盘数据,提取产品分类、客户信息、国家等关键字段,生成结构化报告。当用户需要分析阿里巴巴询盘、生成询盘报告、运行询盘分析时使用。

0· 88·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (Alibaba inquiry analysis) aligns with the code: scripts navigate Alibaba pages, extract chat/customer/company data, classify products, and write reports. Reasonable for this purpose. Minor mismatch: SKILL.md and README claim the skill is 'self-contained' and only requires node, but the code imports 'playwright-core' and expects an OpenClaw browser CDP endpoint; that implies runtime dependencies beyond plain Node and an OpenClaw runtime.
Instruction Scope
SKILL.md instructs to start the OpenClaw browser and login to Alibaba, which matches the code's behavior (it connects to a local CDP endpoint and scrapes pages). The scripts read and write many local files (cache, mapping, reports) — documented in SKILL.md. The code will extract personal/company identifiers (names, emails, company names) from pages — consistent with purpose but worth noting. The code also contains Windows-specific start path hints and will attempt to auto-start/connect to a local OpenClaw instance.
Install Mechanism
There is no install spec (instruction-only from registry perspective) which lowers risk, but the package includes code that requires 'playwright-core' and expects an OpenClaw runtime. That dependency is not declared in requires.bins and is not packaged here; the user environment must provide it. No remote download/install steps are present in the files provided.
!
Credentials
Two notable issues: (1) A RELAY_TOKEN value is hard-coded in lib/inquiry-analyzer.js and lib/okki-background.js ('856baea1afbe169e5eec0f6ecb5b90c77ddeb06b2abe1154'). SKILL.md advises using environment variables for relay tokens, but the code does not read process.env for the token — it uses the literal constant. Embedding a token in code is a credential management and leakage risk. (2) The code references a hard-coded OpenClaw module path (E:\Nvm\...) and a fixed CDP URL (http://127.0.0.1:18800), which are platform-specific and could fail or behave unexpectedly on non-Windows systems.
Persistence & Privilege
The skill is not set to always:true and does not request elevated system privileges. It reads and writes files in its working directory (reports, caches, mappings), which is expected for this tool and documented. It does not modify other skills or global system settings.
What to consider before installing
Things to consider before installing/using: - Hard-coded relay token: The code contains a literal RELAY_TOKEN in lib/inquiry-analyzer.js and lib/okki-background.js. Treat this as a potential secret leak; confirm where the token came from and rotate it if it's a real credential. Prefer replacing hard-coded tokens with environment-variable-based configuration (process.env) before use. - Dependency mismatch: The skill claims 'self-contained' and only declares node, but the code requires 'playwright-core' and an OpenClaw runtime. Ensure your environment provides Playwright/OpenClaw or adjust the code to use available libraries. - Platform assumptions: The code contains a Windows-specific OpenClaw path and fixed CDP URL. If you run on Linux/macOS, verify those paths and connectivity. - Data sensitivity: The tool scrapes Alibaba pages and extracts personal/company identifiers (names, emails, chat text). Run it only with accounts/data you control and consider using an isolated/test environment if you are concerned about data exfiltration. - Review network behavior: From the provided files there are no remote exfiltration endpoints, but confirm there are no hidden remote calls at runtime (e.g., telemetry in your OpenClaw environment). Run in a network-restricted environment or monitor outbound connections when you first execute it. - Safety-first: If you decide to use it, (1) remove or replace the embedded RELAY_TOKEN, (2) run initial tests with a throwaway Alibaba account or in a VM/container, (3) verify Playwright/OpenClaw connectivity, and (4) inspect logs/output to ensure only expected data is written to local files.
scripts/run-analysis.js:98
Shell command execution detected (child_process).
scripts/run-okki.js:96
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk970qk1s76graejja1r143egq983zpww

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binsnode

Comments