Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Daily Beauty
v1.0.10每日美图推送。当用户发送"今日美图"、"美图"、"看美女"等关键词时触发。从小红书搜索真人美女博主,返回1位博主的9张全身照美图。自动排除壁纸号、AI账号、营销号。
⭐ 0· 190·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description promise (search Xiaohongshu and return 9 full-body photos) matches the code behavior. However the code relies on a local MCP service at http://localhost:18060 and on the ImageMagick 'convert' binary, neither of which are documented in SKILL.md or declared as required — that is an unexplained dependency and misalignment.
Instruction Scope
SKILL.md tells the agent to run the Python script and describes data files and output format. It does not mention contacting a local MCP RPC endpoint or the need to have a local proxy/service running. The script makes HTTP requests (to localhost and to Xiaohongshu CDN URLs), downloads files into the user's home directory (~/.openclaw/workspace/img), and invokes subprocess.convert — these network and filesystem actions are expected for the stated purpose but the absence of documentation about the local MCP endpoint widens the scope beyond what the README describes.
Install Mechanism
No install spec (instruction-only) is low risk by itself. But the script has undeclared runtime dependencies: Python 'requests' library and ImageMagick 'convert' binary; there is no install guidance to ensure these are present. That omission can cause unexpected failures or allow surprising behavior if a malicious 'convert' binary is present on PATH.
Credentials
The skill does not request environment variables, credentials, or external API keys. It only reads/writes local data files bundled with the skill and saves images under the user's home. This is proportionate to its described function. Caveat: it communicates with a local MCP service (localhost:18060) — the script assumes that service is trusted but does not declare it; any sensitive data accessible through that local service could be reached.
Persistence & Privilege
The skill does not request forced inclusion (always:false) and does not modify other skills or system-wide settings. It writes only to its own data files and to an img directory under the user's OpenClaw workspace, which is consistent with its function.
What to consider before installing
Before installing or running this skill: (1) Inspect or run the full script in a safe sandbox — the provided snippet calls a local service at http://localhost:18060 (MCP) and that endpoint is not documented in SKILL.md; confirm what MCP is and that you trust it. (2) Ensure required runtime dependencies are present: Python 'requests' and ImageMagick 'convert' (the script invokes convert via subprocess). (3) Be aware the skill will download remote images into ~/.openclaw/workspace/img and update local JSON files — check disk usage, copyright and privacy implications. (4) If you do not run a legitimate local MCP service, the script may fail or interact with an unexpected local service; only run if you control/understand that service. (5) If you want higher assurance, ask the author to (a) document the MCP requirement and how MCP is secured, (b) declare required binaries/dependencies in SKILL.md, and (c) remove or clearly document any external network endpoints the script will contact.Like a lobster shell, security has layers — review code before you run it.
latestvk975t2cygybhyy6s2jgk7bqm9984stpb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
