Hik Cloud Device Channel Management
Analysis
This Hik Cloud skill is purpose-aligned, but it should be reviewed carefully because it can use Hik credentials to change cloud device channel data and can send credentialed requests to a configurable base URL.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
- 同步设备下通道 - 修改通道名称 - 同步设备通道名称
These are mutating device/account operations, not just read-only queries. The artifacts document the operations but do not show a required confirmation or bounded approval step before sync or rename actions.
Source: unknown Homepage: none
The skill is credentialed and can mutate cloud device data, but the registry metadata does not provide a source repository or homepage for provenance review.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
env_base_url = os.getenv(BASE_URL_ENV_VAR)
if env_base_url:
return normalize_base_url(env_base_url)
...
url=base_url.rstrip("/") + TOKEN_PATH,
...
"client_secret": client_secret,The script can take the API base URL from an environment variable and then sends the client secret to that base URL's token endpoint. The visible code only normalizes the string and does not show an allowlist or scheme/host restriction.
脚本会自动读取凭证、获取 token、缓存 token ... `--token-cache-file`:token 缓存文件,默认 `~/.cache/hik_open/token.json`
The skill intentionally reads Hik credentials and stores an access token cache locally. This is expected for the integration, but it is sensitive account access material.
