Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Super Lobster

v1.0.0

Performs aggressive web research and data extraction via local scripts, browser rendering, crawling, and command execution on a China-networked gateway.

0· 41·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the included tools: fetch, render, extract, and crawl scripts for aggressive web research. However, the skill invokes /usr/bin/google-chrome-stable and requires Python libraries (requests, BeautifulSoup, trafilatura) but declares no required binaries or dependencies — a mismatch between claimed needs and actual files.
!
Instruction Scope
SKILL.md explicitly allows writing and executing arbitrary Python/shell programs under /root/.openclaw/workspace/memory/tmp and running local commands (including headless Chrome). That grants the agent broad ability to run arbitrary code and make network requests beyond narrowly-scoped scraping, which could be used to exfiltrate data or perform other actions outside the stated task.
Install Mechanism
No install spec (instruction-only) and code files are included in the skill bundle. This minimizes remote-download risk, but the runtime depends on host-provisioned binaries (chrome) and Python packages that may not exist — the skill assumes host tooling that isn't declared.
!
Credentials
The skill requests no credentials or env vars, yet the tools will perform arbitrary outbound network requests and require host executables and Python packages. The lack of declared required binaries/deps and the instruction to write code as root are disproportionate to a simple scraper and reduce transparency about needed privileges.
!
Persistence & Privilege
always is false (good), but the SKILL.md directs creating and executing scripts under /root paths. That effectively grants persistent local execution capability on the gateway for this skill's user context, increasing blast radius if the skill or its outputs are malicious or flawed.
What to consider before installing
This skill provides useful scraping tools, but it also tells the agent to write and run arbitrary code as root and to invoke host Chrome without declaring that dependency. Before installing: 1) Verify the host has /usr/bin/google-chrome-stable and the required Python packages (requests, bs4, trafilatura) or run in an isolated sandbox. 2) Audit the bundled scripts line-by-line (they are short) and fix any bugs; note fetch_url.py contains a likely string/newline bug. 3) Restrict where the agent can write and execute code (avoid /root if possible) and limit outbound network access to only needed endpoints. 4) If you don't fully trust the skill author or the gateway environment, do not enable this skill on production or sensitive hosts.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bdfdeqhtkz8ex0pze99nmj983y68t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments