Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
whatsapp-monitor
v0.0.1Monitor specified WhatsApp chats for keywords in real time and batch export matched messages to Feishu multi-dimensional tables with optional alerts.
⭐ 0· 65·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description (WhatsApp → Feishu monitoring) aligns with the included scripts (whatsapp_client.py, feishu_client.py, monitor.py, message_processor.py, etc.). However, the skill metadata declares no required credentials or env vars while the runtime expects Feishu credentials (app_id/app_secret/table tokens) and an OpenClaw WhatsApp channel/device pairing. Expectation: credentials are required for operation, but they are only requested via local config files, not via declared env vars.
Instruction Scope
Runtime instructions explicitly direct the user/agent to pair WhatsApp Web, read or create local config files, store Feishu App ID/Secret and table tokens in config/feishu-settings.json, and persist matched messages under data/. The instructions also reference multiple lookup locations (skill dir, env-specified dir, user home), and offer optional alert channels (email/SMS/webhooks). Storing secrets in plain JSON and searching user home without enforcing safe permission practices is scope-creep that increases exposure beyond the stated monitoring task.
Install Mechanism
No remote binary downloads or archive extraction are used. install_deps.sh and run scripts install Python packages via pip from PyPI and run bundled tests. This is standard for Python projects; the install mechanism is proportional to the task.
Credentials
The code expects sensitive credentials (Feishu app_id/app_secret/table tokens and optionally a tenant_access_token) but the skill metadata lists no required environment variables or primary credential. Instead secrets are placed into config/feishu-settings.json. That mismatch (no declared required creds vs. actual runtime secrets) and the default behavior of writing configs into the skill or user-home paths (and the lack of enforced secure permissions) is disproportionate and raises accidental-exposure risk.
Persistence & Privilege
The skill does not request 'always: true' and does not modify other skills or system-wide settings; it creates local config/data/log directories and writes files under the skill directory. Autonomous invocation is allowed by default (normal for skills) but not by itself a reason to classify as malicious.
What to consider before installing
Things to consider before installing or running this skill:
- Credentials handling: The skill expects Feishu credentials (app_id, app_secret, table tokens) but asks you to place them in config/feishu-settings.json (plain JSON), which may be stored under the skill directory or your home directory. Avoid committing that file to git; set secure file permissions and prefer using a secret store or environment variables if you can.
- Inspect whatsapp_client.py and omitted files: The WhatsApp client interacts with WhatsApp Web and may automate a browser or rely on an OpenClaw channel; review those files for any network endpoints or unexpected outbound connections beyond Feishu’s API (open.feishu.cn).
- Principle of least privilege: Create a Feishu app/token with only the table permissions you need, rotate tokens after testing, and restrict IPs or tenant access if possible.
- Test in isolation: Run in a sandbox or non-production account first. The test scripts attempt to write configs and data under the skill directory; confirm file locations and permissions before adding real credentials.
- Legal/privacy: Monitoring WhatsApp conversations may capture private or sensitive data. Ensure you have consent and comply with local laws and company policies before monitoring chats.
- Deployment hygiene: The skill’s metadata does not declare required env vars; if you deploy this inside OpenClaw, explicitly configure env paths and secret storage in OpenClaw rather than leaving secrets in repo files. Consider adding .gitignore entries for config/feishu-settings.json or move secrets to environment variables or a secret manager.
- If you are not comfortable auditing the network and whatsapp_client implementation, treat this skill as higher risk and avoid installing it in privileged environments.Like a lobster shell, security has layers — review code before you run it.
latestvk9746fy7ndh9h5zq5yvjxr6zpn83eww8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
