Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Pangolinfo Amazon Scraper

v1.0.2

Scrape Amazon product data using Pangolin APIs. Use this skill when the user wants to: look up Amazon products by ASIN, search Amazon by keyword, check bests...

0· 62·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description and the shipped code align: the skill calls Pangolin's scrape API (scrapeapi.pangolinfo.com) to fetch Amazon data and supports the advertised parsers/features. Requiring a Pangolin API key or email/password is coherent with the stated purpose. However, the registry metadata lists no required environment variables while SKILL.md and the script clearly require PANGOLIN_API_KEY or PANGOLIN_EMAIL + PANGOLIN_PASSWORD — a metadata/documentation mismatch.
!
Instruction Scope
SKILL.md explicitly instructs the agent to collect credentials from the user and to write/cache the API key at ~/.pangolin_api_key; it also recommends running the bundled script to authenticate. Those instructions grant the skill the ability to persist secrets to the user's home directory and to run local commands, which is within the skill's purpose but is sensitive and deserving of caution. The suggested 'echo "<api_key>" > ~/.pangolin_api_key' approach can leave secrets in shell history on some setups despite the doc's claim that it 'avoids shell history entirely.'
Install Mechanism
No install spec (instruction-only) and the included Python script is zero-dependency and uses only the stdlib. No external downloads or archive extraction are performed by the skill itself. This is low-risk from an install mechanism perspective.
!
Credentials
The skill legitimately needs a Pangolin credential, which is proportionate to its purpose. However, the metadata claims no required env vars while both SKILL.md and the script require/expect PANGOLIN_API_KEY or PANGOLIN_EMAIL+PANGOLIN_PASSWORD. The script will permanently cache the API key in the user's home directory (~/.pangolin_api_key) and will accept live email/password (which it uses to obtain a persistent token). Permanently storing a token in the home directory and treating tokens as 'permanent' increases risk if the user is not fully informed.
Persistence & Privilege
The skill does not request always:true and does not modify other skills. It does persist credentials locally by design (caching API key at ~/.pangolin_api_key and attempts to set restrictive file permissions). That persistence is expected for convenience but is a privileged, long-lived artifact the user should consent to.
What to consider before installing
This skill appears to do what it says (talk to Pangolin's scrape API) but take these precautions before installing or using it: 1) Verify the source — there is no homepage and the registry metadata omits the required env vars; confirm you trust the publisher or inspect the included scripts yourself. 2) Be aware it will ask for your Pangolin API key (or email+password) and will cache a permanent token at ~/.pangolin_api_key. If you are uncomfortable with a long-lived token stored in your home directory, do not provide credentials. 3) Avoid copying credentials directly into shell history. Prefer setting PANGOLIN_API_KEY in the session environment and let the script save it (then unset the env vars), or create the cache file via a secure method (use a secure editor, echo redirected from a file descriptor, or a secrets manager). 4) Consider creating a limited/test Pangolin account or API key with minimal credits before supplying real credentials. 5) If you proceed, review the scripts/pangolin.py file yourself (it is included) to confirm endpoints, behavior, and that nothing unexpected is transmitted. 6) Ask the publisher for a homepage/repository and more provenance if you need higher assurance. If you want, I can point out the exact lines in scripts/pangolin.py that perform caching and network calls and suggest safer ways to provide credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk971ancy0y6dntj55232m50z2s83jdnc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments