移动网大自动挂机Skill

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is coherent for automating Wangda course study, but it uses stealth browser automation, logged-in browser profiles, and recurring OS scheduled tasks that need careful review.

Install only if you intentionally want unattended Wangda course automation and understand it may violate site or employer training rules. Use a dedicated Chrome profile, confirm any scheduled task it creates, know how to stop/remove it, and review the stealth extension before trusting it with a logged-in account.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may continue controlling the browser and advancing courses in the background until the scheduled task is removed.

Why it was flagged

The skill creates recurring OS-level scheduled tasks to run `tools.py monitor-hook`, allowing it to keep acting after the initial command.

Skill content
cron_line = f"*/{interval_min} * * * * {cron_cmd} {cron_tag}" ... ["schtasks", "/create", "/tn", task_name, "/tr", cmd, "/sc", "MINUTE", "/mo", str(interval_min), "/f"]
Recommendation

Only use it if you explicitly want background automation; verify the scheduled task is created with your consent and know how to remove the WANGDA_MONITOR/WangdaMonitor task.

What this means

Users may not realize the skill is designed to conceal automation from the website, which can create account, compliance, or trust risks.

Why it was flagged

The Chrome launch options deliberately hide automation signals and load a stealth extension, while SKILL.md frames the behavior simply as course learning assistance.

Skill content
"--disable-blink-features=AutomationControlled", "--exclude-switches=enable-automation", f"--load-extension={ext_dir}"
Recommendation

Disclose the stealth behavior prominently and let users decide whether they accept the site-policy and account risks.

What this means

A browser extension with stealth/dynamic execution can alter page behavior in ways that are hard for the user to inspect.

Why it was flagged

The static scan reports dynamic code execution in a stealth extension, and the snippet indicates anti-debugger/anti-detection behavior.

Skill content
//    对抗 new Function("debugger") 及各种混淆变体
Recommendation

Avoid loading stealth code unless it is fully reviewed; provide the full extension source, explain exactly what it changes, and remove dynamic/anti-debugger behavior if not essential.

What this means

If pointed at a real browser profile, the skill can act as the logged-in user and may expose that browser session to local DevTools control.

Why it was flagged

The skill runs Chrome with a persistent profile directory and remote debugging enabled, which grants broad control over the logged-in browser session.

Skill content
f"--remote-debugging-port={DEBUG_PORT}", f"--user-data-dir={user_data_dir}"
Recommendation

Use a dedicated empty Chrome profile for this skill, declare the credential/session requirement in metadata, and avoid using a normal personal browser profile.

What this means

The skill can perform real browser actions on the user's account, including login flow and page interaction, not just read progress.

Why it was flagged

The helper scripts use raw Chrome DevTools Protocol calls to execute JavaScript and simulate clicks/typing in the logged-in browser.

Skill content
await call(ws, "Runtime.evaluate", {"expression": expression, "returnByValue": True}) ... "Input.dispatchMouseEvent" ... "Input.dispatchKeyEvent"
Recommendation

Require explicit user approval before login, navigation, clicking, typing, or starting automatic study; strictly validate Wangda hostnames before navigation.

What this means

Users may not know what runtime setup or trust boundary is required before running the skill.

Why it was flagged

The package contains runnable scripts, but the metadata does not declare provenance, installation needs, environment variables, Chrome requirements, or Python dependencies.

Skill content
Source: unknown ... No install spec — this is an instruction-only skill ... Required env vars: none
Recommendation

Publish clear provenance, dependency, binary, and environment-variable declarations before installation.

What this means

Local session data may persist across tasks and influence later automated study actions.

Why it was flagged

The skill stores persistent session data, including browser-control configuration and learning progress, in a local session file.

Skill content
SESSION_FILE = os.environ.get("_WANGDA_SESSION_FILE") ... "debugPort": int(os.environ.get("_WANGDA_DEBUG_PORT", "0")), "userDataDir": os.environ.get("_WANGDA_USER_DATA_DIR", "")
Recommendation

Keep the session file in a dedicated location, review or reset it when switching accounts, and avoid sharing it.