Ai Cv Weekly

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: lunaclaw-brief Version: 4.0.0 LunaClaw Brief is a comprehensive AI-powered report generation engine that aggregates data from multiple technical and financial sources (including GitHub, arXiv, Eastmoney, and Yahoo Finance). The codebase implements a well-structured 8-stage pipeline (Fetch, Score, Select, Dedup, Edit, Quality, Render, Output) using professional design patterns like Adapters and Registries. It supports automated delivery via SMTP and webhooks, and includes a built-in cron scheduler for recurring reports. While the skill possesses broad network and file system access, these capabilities are strictly aligned with its stated purpose of content aggregation and report distribution. No evidence of malicious intent, unauthorized data exfiltration, or prompt injection attacks was found; sensitive credentials like API keys and SMTP passwords are appropriately handled via environment variables or local configuration files.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the model returns a malformed or adversarial preset name, creating a custom preset could write or overwrite YAML files outside the intended custom_presets directory.

Why it was flagged

The preset name comes from LLM-generated JSON and is used directly to construct a file path. The provided code does not show a regex check, path-separator rejection, or resolved-path containment check.

Skill content
data = json.loads(clean) ... preset = PresetConfig(**data) ... save_path = save_dir / f"{preset.name}.yaml"
Recommendation

Validate preset.name with a strict pattern such as ^[a-z0-9_]{1,30}$, reject path separators, resolve the final path, verify it stays inside data/custom_presets, and ask before overwriting existing files.

What this means

Running the skill may consume or expose the authority of the configured LLM/OpenClaw credential to the selected provider endpoint.

Why it was flagged

The skill uses API credentials for LLM access even though registry metadata declares no required env vars or primary credential. The use appears purpose-aligned and no credential leakage is shown.

Skill content
oc_key = os.getenv("OPENCLAW_API_KEY") or os.getenv("OPENCLAW_TOKEN") ... self.api_key = llm_config.get("api_key") or os.getenv("BAILIAN_API_KEY", "")
Recommendation

Declare the credential requirements in metadata and use a dedicated, scoped API key where possible.

What this means

Sensitive text included in a user hint or report source material could be sent to the configured LLM endpoint.

Why it was flagged

The skill sends report prompts, source snippets, and user hints to a configured LLM provider. This is expected for LLM report generation, but users should know data leaves the local environment.

Skill content
payload = {"model": self.model, "messages": messages, ...}; requests.post(url, headers=headers, json=payload, timeout=self.timeout)
Recommendation

Use only trusted LLM endpoints, avoid putting secrets or private data in report hints, and document what content is sent externally.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

If enabled, the scheduler can continue producing and sending reports after the initial command.

Why it was flagged

The skill supports a scheduled mode that can keep generating and delivering reports. It is disclosed and appears user-invoked, not hidden.

Skill content
python -m brief.scheduler                        # Run scheduled jobs ... Cron Scheduler: Auto-generate reports on schedule with multi-channel push
Recommendation

Only run the scheduler intentionally, review all cron entries and delivery destinations, and stop the process when scheduled delivery is no longer wanted.

What this means

Users may need to install dependencies manually without registry-level install metadata or a clear upstream homepage.

Why it was flagged

The README documents dependency installation, while the registry has no install spec and the source/homepage are not provided. This is a provenance and reviewability note, not evidence of malicious installation.

Skill content
pip install -r requirements.txt
Recommendation

Review requirements.txt, prefer pinned dependency versions, and install in an isolated environment.