adaptive-web-analyzer

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

If honored by the agent runtime, this could allow the skill to run local commands beyond what is needed for web summarization.

Why it was flagged

The skill declares broad local command-execution authority even though the documented workflow is to fetch web content, parse it, send it to an LLM, and return a report.

Skill content
permissions: ["web.fetch", "web.scrape", "llm.chat", "file.write", "system.exec"]
Recommendation

Remove system.exec unless there is a specific reviewed command path; require explicit user approval for any local execution and keep file writes scoped to user-selected report output paths.

What this means

The agent may attempt stealthy scraping against sites that do not permit automated access, which can violate site terms or trigger account/IP blocking.

Why it was flagged

The skill explicitly advertises automatic bypass of anti-bot protections such as Cloudflare. Even for a scraping skill, this is higher-risk behavior and lacks clear approval, target ownership, or policy guardrails.

Skill content
反反爬处理:自动绕过Cloudflare等基础防护(遵守robots.txt)
Recommendation

Limit use to sites the user owns or is authorized to scrape, make stealth/bypass modes opt-in, and document clear compliance checks such as robots.txt and rate limits.

What this means

Stealth fetching can make automated access harder for websites to detect and may be inappropriate for some targets.

Why it was flagged

The implementation includes an optional stealth fetching path. This matches the scraping purpose, but users should understand that it changes how the agent interacts with target websites.

Skill content
if stealth:
            fetcher = StealthyFetcher()
        else:
            fetcher = Fetcher()
        
        response = fetcher.get(url)
Recommendation

Use normal fetching by default and reserve stealth mode for authorized testing or owned properties.

What this means

Supplying tokens or auth headers to the wrong URL could disclose account credentials to that site.

Why it was flagged

The skill can use user-supplied authentication headers. This is expected for API access, but it means credentials could be sent to the chosen endpoint.

Skill content
使用HTTP客户端发送请求(支持自定义Headers、Auth)
Recommendation

Only provide scoped, temporary credentials for trusted endpoints, and verify the destination URL before use.

What this means

If the fetched content is confidential, it may be exposed to the model processing path.

Why it was flagged

The skill discloses that extracted content is sent to an LLM for analysis. This is central to the purpose, but private pages or API responses may contain sensitive information.

Skill content
将结构化文本发送给LLM,执行以下分析
Recommendation

Avoid using the skill on private, regulated, or credential-protected content unless the model/data-handling policy is acceptable.

What this means

If a user tries to run the included code, they may need to install packages from external sources that are not pinned or reviewed here.

Why it was flagged

The configuration references runtime dependencies, including optional scraping/browser automation packages, while the registry shows no install spec. This is an incomplete setup/provenance signal rather than evidence of malicious behavior.

Skill content
"dependencies": { "required": ["requests", "beautifulsoup4", "html2text"], "optional": { "scrapling": "用于高级反爬和自适应解析", "playwright": "用于JavaScript动态渲染" } }
Recommendation

Provide a clear install spec or lockfile with pinned dependency versions and review optional browser/stealth packages before enabling them.