Hik Cloud Device Alarm Capability Management
Analysis
This skill is purpose-aligned, but it can change security-device alarm settings and handles Hik-Cloud credentials in ways users should review carefully before installing.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`update-status`:修改报警能力状态 ... `status` = 常规报警能力状态 ... `0` 关/撤防、`1` 开/布防
The skill can change whether alarm capabilities are armed or disarmed, but the artifacts do not show an explicit approval or rollback safeguard before these mutations.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
参数:`client_id`、`client_secret` ... 认证接口与业务接口统一跟随当前 base URL ... `HIK_OPEN_BASE_URL`(可选,用于指定自定义环境域名)
OAuth credentials are sent to the current base URL, and the base URL is configurable; the artifacts do not show an allowlist or HTTPS-only restriction for where the client secret may be sent.
DEFAULT_TOKEN_CACHE = Path.home() / ".cache" / "hik_open" / "token.json" ... cache_file.write_text(json.dumps(payload, ensure_ascii=False, indent=2), encoding="utf-8")
The helper writes token material to a persistent local cache file, which is expected for automatic token refresh but sensitive.
