Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cyber Growth

v1.0.0

赛博朋克 × EVA 风格的成长追踪系统。支持两种模式:(1) 自动化模式 — Agent 在对话结束时调用 accumulate.sh 积累事件,每天 24:00 nightly.sh 自动结算,每天 9:00 morning-report.sh 发送晨间报告;(2) 手动模式 — 直接调用 grow.sh r...

0· 275·1 current·1 all-time
bySyfy@m17y
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Name/description (a local 'growth tracking' tool) matches the files and scripts provided: local JSON/JSONL storage, reporting, and optional Feishu sync. No unexpected external services are required by default.
!
Instruction Scope
SKILL.md instructs the Agent to autonomously call accumulate.sh at the end of conversations ('不需要等用户询问,Agent 主动记录'), which grants broad discretion to record dialogue-derived strings. Accumulated events are appended locally, which fits the purpose, but automatic and unsupervised logging of arbitrary conversation content is privacy-sensitive and increases attack surface when combined with other issues (see environment/proportionality and install_mechanism).
Install Mechanism
Instruction-only with bundled scripts — no installer or remote downloads. Scripts are stored under the skill directory and only run when invoked. This is low-risk from supply-chain/install perspective.
Credentials
No environment variables or external credentials are required by default. Optional Feishu sync exists and is configured by writing tokens into the local data file; that is proportionate but should be treated as an explicit opt-in. The skill writes to $HOME/.openclaw/memory which is expected for a local tracker.
!
Persistence & Privilege
always:false (good). However SKILL.md explicitly asks Agents to autonomously record events during conversations and suggests cron/heartbeat automation for nightly/morning runs. Autonomous recording + scheduled processing increases risk if not opt-in or rate-limited; combined with a code-injection vulnerability in the scripts, this is particularly hazardous.
What to consider before installing
This skill is largely what it says: a local growth tracker that appends events to files and generates reports. However, do NOT enable automatic agent-driven recording or cron processing until you address a critical flaw: grow.sh embeds user-supplied description strings directly into python3 -c code without escaping, which can allow arbitrary code execution if an attacker or malicious input supplies a crafted description. If you still want to use it, take these precautions: (1) run only in a sandboxed environment or throwaway account; (2) disable automatic/agent-initiated recording and require manual calls; (3) do not configure Feishu sync (or any external sync) unless you trust and have reviewed the sync implementation; (4) patch grow.sh to avoid interpolating unescaped strings into python -c (use a safe JSON writer, pass data via stdin or use a dedicated JSON library call that reads from a file or stdin); (5) inspect sync_to_feishu and any network-calling code before providing tokens. Because of the unsanitized Python interpolation plus the automatic-recording guidance, treat this skill as suspicious until remediated.

Like a lobster shell, security has layers — review code before you run it.

latestvk9740xx8s5ct764v640ek7naeh82d2ye

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments