Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
nanyuu
v1.0.0Collect and locally extract ride-sharing receipt data from Gmail, store it in JSON/SQLite, and generate anonymized ride-behavior insights using a local OpenC...
⭐ 0· 24·0 current·0 all-time
bynanda nyi aung@nandaniawug
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
high confidencePurpose & Capability
The required binaries (gog, python3) and the declared gateway env vars align with the stated purpose of fetching Gmail receipts and using a local OpenClaw Gateway. However the registry-level name/slug/owner/version differ from the SKILL.md and included _meta.json (SKILL lists 'ride-insights' / DataHive, registry lists 'nanyuu'/'nansui'), which is an inconsistency in provenance that should be explained by the publisher.
Instruction Scope
SKILL.md instructs the agent to prompt for user consent before sending raw email JSON/HTML to the Gateway and to always use a local loopback Gateway only; the implementation sends the full per-email JSON to the Gateway /v1/responses endpoint. The code does not itself prompt for user confirmation (prompting is an agent-level behavior), so the runtime depends on the agent following the SKILL.md. Also the SKILL.md and code explicitly read ~/.openclaw/openclaw.json as a token fallback — this file access is not declared in the skill's required config-paths metadata.
Install Mechanism
No install spec (instruction-only); files are bundled in the skill and there are no external downloads or extract steps. This is the lower-risk install pattern.
Credentials
Declared env vars (OPENCLAW_GATEWAY_TOKEN, OPENCLAW_GATEWAY_URL, OPENCLAW_GATEWAY_MODEL) are appropriate for talking to a Gateway. However the code also reads a local config file (~/.openclaw/openclaw.json) as a fallback for the token — that config path was not declared in the skill metadata. The skill also requires the gog CLI to be authenticated to the user's Gmail account, which is expected for this functionality but is a sensitive capability the user should explicitly consent to.
Persistence & Privilege
The skill writes persistent artifacts to data/ride-insights (emails.json, rides.json, rides.sqlite) as documented. It does not request 'always: true' or modify other skills. The only elevated access beyond declared env vars is reading ~/.openclaw/openclaw.json (local config).
What to consider before installing
This skill largely does what it claims (fetch Gmail receipts via the gog CLI, send raw email JSON to a local OpenClaw Gateway for extraction, store results locally, and export anonymized CSV). Before installing or running it, consider the following:
- Provenance mismatch: the registry metadata (name/slug/owner/version) does not match the SKILL.md and _meta.json inside the package. Ask the publisher to clarify why, and prefer only skills whose package metadata matches the registry.
- Local config access: the code will read ~/.openclaw/openclaw.json as a fallback for the Gateway token but the skill did not declare this config path. If that file contains other secrets, verify what it holds before proceeding.
- Gmail access: the skill requires the gog CLI to be authenticated to your Gmail account. That gives the skill access to emails; run the gog commands yourself to confirm account(s) and inspect the gog auth configuration before granting access.
- User confirmation: the SKILL.md instructs the agent to ask for explicit user consent before sending raw receipt JSON/HTML to the Gateway. The bundled scripts do not enforce interactive confirmation — ensure the agent will prompt you and do not run the extraction scripts unattended unless you have reviewed the data flow.
- Local-only guarantee: the code enforces that the Gateway URL resolves to localhost/127.0.0.1/::1. Verify your OPENCLAW_GATEWAY_URL and OPENCLAW_GATEWAY_TOKEN are set correctly and that the Gateway is indeed local.
If you do not trust the publisher or cannot confirm the provenance discrepancy, run the provided Python scripts manually (inspect them first), and avoid giving the agent direct autonomous permission to run them. If you proceed, back up/remove any sensitive files (emails.json) when finished.Like a lobster shell, security has layers — review code before you run it.
latestvk97da53debt7kpe140ygmv2h6h8498zb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binsgog, python3
EnvOPENCLAW_GATEWAY_TOKEN, OPENCLAW_GATEWAY_URL, OPENCLAW_GATEWAY_MODEL
