Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Samvida

v0.3.3

Generate an agentic contract (llms.txt) for any business website. Crawls the site, fills gaps conversationally, and produces a structured agent-optimized llm...

0· 414·0 current·0 all-time
byNaman Muley@ngm9
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (generate llms.txt for a site) matches the included crawler and deploy scripts and the conversational gap-fill flow. The optional Cloudflare/Webflow/Framer deploy paths and credentials are appropriate for the stated 'deploy' feature.
Instruction Scope
Runtime instructions tell the agent to run the included crawl.py and deploy.py, write/read temporary files in /tmp, and send crawled page text to the configured OpenClaw LLM for generation. This is expected for the task, but it means the skill will extract emails/names/raw page text and surface them to the LLM — a privacy consideration.
Install Mechanism
Instruction-only install (no external download) and bundled Python scripts only require standard Python packages (httpx, beautifulsoup4). The package.json insists on a specific virtualenv path (~/.virtualenvs/samvida) and workspace paths (~/.openclaw/workspace/...), which is brittle but not malicious.
Credentials
No environment vars are forced at install time. Deployment paths optionally request Cloudflare/Webflow/GitHub tokens — these are proportional to the deploy feature and declared in metadata as prompted at runtime and not persisted. There are no unrelated credentials requested.
Persistence & Privilege
The skill does not request permanent 'always' inclusion and does not modify other skills. Deploy operations require explicit user action ('deploy') and external credentials. There is no indication the skill auto-persists credentials.
Assessment
Samvida appears to do what it says, but keep these practical cautions in mind before installing or running it: - Data exposure: the crawler extracts raw page text, emails, and other contact details and sends that content to your configured OpenClaw LLM for generation. Do not use it on sites containing sensitive or private information unless you accept that those page contents will be processed by your LLM provider. - Internal/host-reachability risk: the crawler will fetch any URL you (or the agent) provide. If the agent runs in an environment that can reach internal/private hosts, you could accidentally cause the skill to crawl internal services. Only provide URLs you intend to be crawled. - Deploy credentials: Cloudflare/Webflow tokens are requested only at deploy time and appear to be used directly to call provider APIs. Before giving a token, verify its scope and only grant the minimum necessary permissions (e.g., Workers Scripts: Edit for Cloudflare). Double-check the worker JS payload that will be uploaded if you choose to deploy. - Environment assumptions: the skill assumes a Python virtualenv at ~/.virtualenvs/samvida and an OpenClaw workspace path (~/.openclaw/workspace/samvida). If your environment differs, the provided CLI examples will fail; create the venv or adjust paths as needed. - Review outputs before publishing: the generated llms.txt may include extracted personal emails/names and any user-provided conversational answers. Inspect the draft and the final file before deploying it to a public domain. If you want tighter safety: test the skill on a non-sensitive public site first, confirm the /tmp files and worker script contents locally, and restrict deploy tokens to minimal scopes or use temporary sandbox accounts for initial runs.

Like a lobster shell, security has layers — review code before you run it.

latestvk977nv0ndn5ghmdz96dqyaz419823857

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments