majia-guanyuan

PassAudited by VirusTotal on May 13, 2026.

Overview

Type: OpenClaw Skill Name: guanyuan-majia Version: 2.1.0 The skill bundle is a comprehensive and well-documented toolset for managing Guandata BI (观远 BI) instances. It consists of a Python API client (scripts/guandata.py), a Node.js installer (bin/install.js), and extensive instructions for AI agents (SKILL.md). The code logic is entirely consistent with the stated goals of data querying, ETL management, and custom chart development. Sensitive credentials are managed locally via a gitignored config.json and are only transmitted to the user-specified BI endpoint. While the skill involves high-privilege operations like ETL modification and custom JS injection within the BI platform, these are legitimate features of the target system, and the instructions provided to the agent are focused on operational accuracy and error handling rather than malicious exploitation or data exfiltration.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used with a privileged BI account, the agent could change or remove dashboards, datasets, or ETL pipelines.

Why it was flagged

The normal workflow includes raw Guandata BI API calls that create/update/run and delete ETL or dataset objects. These are high-impact production mutations, and the provided artifacts do not show mandatory confirmation, backup, or rollback controls.

Skill content
“POST /api/etl/direct-save” ... “DELETE /api/data-source/ 必须先于 DELETE /api/etl/”
Recommendation

Use a least-privilege or test BI account, require explicit human approval for every write/delete/execute action, work on copied pages or folders first, and keep backups or rollback IDs.

What this means

Private business data or implementation details could be written into persistent local skill files and reused in later sessions.

Why it was flagged

The skill instructs the agent to persist runtime errors and payload snippets into long-lived skill or planning documents. That can store sensitive BI details and alter future agent context without a clear opt-in boundary.

Skill content
“遇到意外的错误立即把它落到 SKILL.md ... 或 ExecPlan 的 Surprises & Discoveries ... 含 task error 原文、payload 片段”
Recommendation

Make this logging opt-in, sanitize payloads and errors before saving, prefer task-scoped notes over SKILL.md edits, and review any persistent updates before keeping them.

What this means

Anyone or any process that can read the local config file may be able to access the BI instance with that account’s privileges.

Why it was flagged

The skill requires local plaintext Guandata BI credentials. This is disclosed and purpose-aligned, but it gives the agent access to the user’s BI account.

Skill content
“配置文件: config.json(含明文凭据,已被 .gitignore 排除)” ... “login_id / password ✅”
Recommendation

Use a dedicated least-privilege BI account, protect file permissions on config.json, avoid sharing the skill directory, and rotate credentials if the file may have been exposed.

What this means

Poorly reviewed chart code could break dashboards, expose data inside the BI page, or create confusing UI behavior.

Why it was flagged

Custom HTML/CSS/JS injection is an explicitly advertised feature for BI chart development. It is purpose-aligned, but injected JavaScript can affect BI pages if unsafe.

Skill content
“自定义图表 HTML/CSS/JS 注入、固定卡片/overlay、payload_json 取数、路由清理”
Recommendation

Review injected JavaScript, avoid third-party scripts unless trusted, test on copied pages first, and remove/debug overlay code after validation.

What this means

A tampered tarball could install untrusted skill code into the agent environment.

Why it was flagged

The artifacts document an optional dependency workflow involving manually transferred tarballs and removal of macOS quarantine metadata. Without checksum/signature verification in the provided evidence, this weakens provenance safeguards.

Skill content
“从微信传 tarball 到 <bin> install-skill 的四步法” ... “xattr -dr com.apple.quarantine”
Recommendation

Prefer direct installation from a trusted registry or internal package source, verify checksums or signatures, and only remove quarantine after independently confirming the file’s origin.