Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Simple Websearch

v2.0.0

极简网络搜索技能 - 支持通用搜索 + 社交媒体搜索(小红书/知乎/微博)

0· 113·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
Name/description match the code's intent (general + social-media search). However the Python code invokes external helper scripts at absolute paths (/home/lin/.openclaw/scripts/exa-search.sh and /home/lin/.openclaw/workspace/skills/dynamic-webfetch/scripts/fetch.py). Those external scripts are not included, not documented in SKILL.md, and are environment-specific — requiring local helper tools is disproportionate to a self-contained search skill and may cause it to execute arbitrary local code.
!
Instruction Scope
SKILL.md describes pure HTTP-based searching and optional Playwright. The runtime code does perform HTTP scraping (requests) which is expected, but also runs subprocesses to call external scripts for 'Exa' results and dynamic webfetch. The SKILL.md does not disclose these subprocess invocations or the absolute filesystem paths referenced, so the documented runtime behavior is incomplete and grants the skill the ability to execute local programs outside the package.
Install Mechanism
There is no install specification in the skill registry (instruction-only), but the package contains setup.py, requirements.txt, and multiple scripts — so it is not purely instruction-only. Installation is local (pip requirements only). No remote downloads or URL-based installers were found, which lowers installer risk, but the mismatch between 'no install spec' and presence of installable package is inconsistent and worth noting.
!
Credentials
The skill declares no environment variables or credentials (good). However, it relies on absolute paths to other local skill scripts and will execute them via subprocess. That behavior does not require new credentials but does assume and potentially execute code outside its package, which is not proportional to the documented requirements and increases risk (especially if those external scripts send data off-host).
Persistence & Privilege
The skill is not marked always:true and does not request persistent elevated privileges. It does not modify other skills' configs in the observed files. Autonomous invocation is allowed (platform default) but is not combined here with additional privilege requests.
What to consider before installing
This skill largely implements web scraping/search logic and is probably useful for searches, but there are notable red flags you should consider before installing or running it: - Hardcoded external script calls: The code calls /home/lin/.openclaw/scripts/exa-search.sh and /home/lin/.openclaw/workspace/skills/dynamic-webfetch/scripts/fetch.py via subprocess. These files are not included in the package or documented in SKILL.md. If those paths exist on your system they will be executed with your privileges; if they do not exist the skill will silently degrade. - Undocumented execution surface: SKILL.md describes HTTP scraping and optional Playwright, but does not mention executing local helper scripts. Treat the skill as executing local programs in addition to making network requests. - Inspect external helpers: If you plan to use this, locate and review the referenced exa-search.sh and dynamic-webfetch fetch.py scripts on your system (or ask the author for them). Ensure they are trustworthy before allowing the skill to run. - Run in isolation first: Execute the skill in a sandboxed or ephemeral environment (container/VM) to observe its behavior, especially the subprocess calls and any outbound network traffic. - Optional Playwright: If you enable Playwright, it will install and run a browser (chromium) which increases resource/attack surface; only enable if needed. - Package vs. documentation mismatch: The skill is deliverable as a pip package (setup.py) but registry metadata claimed instruction-only — be cautious about installing it system-wide. Confidence is medium because the visible code explains the suspicious behavior (subprocess calls) but the referenced helper scripts are not present so the full runtime effects cannot be determined without those files. If you can provide the contents of the referenced exa-search.sh and dynamic-webfetch scripts (or confirm they don't exist on your system), I can raise or lower the risk assessment accordingly.

Like a lobster shell, security has layers — review code before you run it.

exavk970ycwvxc5825f0g1yf7qjwbx84gm7elatestvk970ycwvxc5825f0g1yf7qjwbx84gm7esearchvk970ycwvxc5825f0g1yf7qjwbx84gm7esocial-mediavk970ycwvxc5825f0g1yf7qjwbx84gm7ewebvk970ycwvxc5825f0g1yf7qjwbx84gm7eweibovk970ycwvxc5825f0g1yf7qjwbx84gm7exiaohongshuvk970ycwvxc5825f0g1yf7qjwbx84gm7ezhihuvk970ycwvxc5825f0g1yf7qjwbx84gm7e

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments