Back to skill
Skillv1.0.0

ClawScan security

Sunset Bot (国内火烧云预报) · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 18, 2026, 4:59 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, instructions, and configuration are consistent with a web-scraping + notification tool for sunset/firecloud forecasts and do not request unrelated credentials or system access.
Guidance
This skill appears to do exactly what it says: scrape sunsetbot.top in a headless browser, log results locally, and optionally send messages via Feishu. Before installing: 1) Confirm you trust the external site (https://sunsetbot.top) that the skill visits. 2) If you enable cron and notifications, configure the Feishu/OpenClaw messaging integration carefully — the skill will call feishu_im_user_message via OpenClaw, so ensure tokens/OpenIDs are correct. 3) Review the headless-Chrome guide: it recommends disabling the Chrome sandbox (noSandbox), which weakens process isolation on the host — only do this in environments where you accept that risk. 4) If you will accept free-form city inputs from untrusted sources, review/escape inputs because city values are interpolated into inline JS passed to the browser evaluate call (could break or cause unexpected behavior). 5) Check the data/ directory for logs (sunsetbot-monitor.log) and ensure retention/permissions meet your policy.

Review Dimensions

Purpose & Capability
okName/description (查询火烧云预报 + 定时通知) match the provided code and SKILL.md: the script navigates to https://sunsetbot.top, extracts page values, writes local logs, and sends notifications via a messaging channel. Required resources (browser support, an optional Feishu OpenID in config) are appropriate for that purpose.
Instruction Scope
noteSKILL.md keeps scope to fetching forecast pages and sending notifications. It instructs use of OpenClaw's browser() and cron. Two notes: (1) the script injects user-supplied strings (city, date types) into inline JS passed to browser.evaluate — this is a robustness/input-sanitization concern (could break or behave unexpectedly for maliciously-crafted inputs), and (2) the instructions advise enabling headless Chrome with no-sandbox in OpenClaw config, which increases runtime risk for the overall environment (explained in guidance). The skill does not instruct reading unrelated files or env vars.
Install Mechanism
okNo install spec is present (instruction-only with code included), so nothing is downloaded or installed by an install hook. The included headless Chromium guide references downloading Chrome from an official Google URL and Playwright commands — those are normal for enabling the browser tool but are not executed by the skill itself.
Credentials
noteThe skill does not declare or require any environment variables or secrets. It does rely on an OpenClaw-provided messenger function (feishu_im_user_message) and a local config file (config/config.json) containing a userOpenId; these are proportional to notification functionality. There is no request for unrelated credentials. Ensure that your OpenClaw instance's messaging integrations (Feishu tokens) are intentionally configured.
Persistence & Privilege
okalways is false and the skill does not request permanent platform-level privileges or modify other skills. It writes logs under its own data/ directory only.