Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Crewai Team

v1.0.0

使用 CrewAI 多 Agent 团队进行产品需求分析和 PRD 生成

0· 123·1 current·1 all-time
byMr-ChenXY@namechenxinyu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The name/description (CrewAI multi-agent PRD generation) matches the included code and docs (team_config, run_*.py, README, etc.). Requiring python3.10 is reasonable. However the registry metadata claims no required env vars while the SKILL.md and SETUP.md clearly instruct the user to configure a DASHSCOPE_API_KEY / OPENAI_API_KEY — the declared requirements are inconsistent with the skill's own instructions.
!
Instruction Scope
SKILL.md and SETUP.md instruct the user to supply an API key and run local scripts. Multiple runtime scripts (e.g., run_discussion.py, run_hierarchical.py, run_interactive.py, run_minimal.py, run_mobile.py) programmatically set environment variables to a hard-coded API key and base URL (for example: os.environ["OPENAI_API_KEY"] = "sk-sp-e0fb4e4a6dba43fb9bd707b8ef48bd6b" and OPENAI_API_BASE pointing to a DashScope endpoint). That contradicts instructions to use your own .env and means the skill will override user settings and use the embedded key when executed. Overwriting env vars and shipping an embedded secret widens the runtime scope beyond what's documented and could cause unintended network calls and billing or data exposure through that credential.
Install Mechanism
There is no automatic install spec (instruction-only in registry), and dependencies are listed via requirements.txt (crewai, crewai-tools, langchain-*). That is proportionate for a Python-based multi-agent tooling package. No suspicious external download URLs or archive extracts were found in the manifest provided.
!
Credentials
The skill's files and docs require an LLM API key in practice (DASHSCOPE_API_KEY / OPENAI_API_KEY), yet the registry declares no required env vars. Worse, multiple run_*.py scripts hard-code an API key and base URL into os.environ — a clear mismatch and an embedded credential. Embedded keys can be abused (unexpected network requests, billing, or data exposure). The number of env vars is small and appropriate for the purpose, but the presence of a hard-coded secret is disproportionate and suspicious.
Persistence & Privilege
The skill does not declare always:true and does not request system-wide config changes. It writes output PRD files to the workspace (expected). The problematic behavior is not privilege escalation but the scripts' tendency to override environment variables at runtime (process-level, not persistent system-wide), which may still cause undesired use of the embedded credential.
What to consider before installing
This package appears to implement a legitimate CrewAI multi-agent PRD generator, but exercise caution before running it. Key points: (1) Several runtime scripts embed and set a hard-coded API key and API base (e.g., run_discussion.py and others set os.environ['OPENAI_API_KEY'] = "sk-..." and OPENAI_API_BASE to a DashScope URL). Embedded secrets are a serious red flag — they may be stale, leaked, or intentionally included to route usage through someone else's account. (2) The SKILL.md/SETUP.md tell you to configure your own .env/DASHSCOPE_API_KEY, yet the registry metadata lists no env vars — this inconsistency suggests sloppy or unsafe packaging. (3) Don’t run the scripts until you’ve inspected and removed the hard-coded keys: search all run_*.py and team_config files for os.environ assignments and replace them with secure code that reads from your .env or process environment. (4) If the embedded key is valid, treat it as compromised: do not rely on it, and rotate any of your own keys if you ran these scripts with them present. (5) Prefer running in an isolated environment (container or VM), review network calls (especially to the configured OPENAI_API_BASE / dashscope endpoint), and review send-to-external integrations (Feishu/webhook code) before use. If you want to proceed safely: a) remove/neutralize the hard-coded key lines, b) ensure the code reads API credentials only from your explicit .env or process env, c) run tests offline or with a known test key, and d) consider auditing the code for any unexpected outbound network calls.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cach5tnxppemcqzzf7tj5dd834mfs

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

👥 Clawdis
Binspython3.10

Comments