Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cellcog

v2.0.8

Any-input to any-output AI sub-agent — deep research, images, video, audio, music, podcasts, documents, spreadsheets, dashboards, 3D models, diagrams, and co...

7· 11.7k·80 current·86 all-time
byCellCog@nitishgargiitd
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (any-input → any-output agent) lines up with the declared requirements: python3 and a CELLCOG_API_KEY for an external service. Requesting an API key and using an SDK to upload files and produce artifacts is reasonable for this capability.
Instruction Scope
SKILL.md explicitly instructs the agent/user to provide absolute local file paths in <SHOW_FILE> tags so the service can read those files. That is coherent with the skill's purpose, but it means the agent will transmit arbitrary local files to CellCog's service — a potential data‑exfiltration vector that users must consent to. No other unexpected system files or env vars are requested in the instructions.
Install Mechanism
There is no formal install spec in the registry (instruction‑only). SKILL.md suggests `pip install cellcog` if import fails. Installing a third‑party PyPI package runs code from that package and may have risks; because the registry did not provide a vetted install spec or packaged code, users should review the package source or install in an isolated environment.
Credentials
Only one required secret is declared (CELLCOG_API_KEY), which matches the SDK usage and is proportionate. However, the instructions also rely on passing an OpenClaw session key (notify_session_key) to deliver results; that session identifier is sensitive but is not listed in requires.env — callers must ensure they don't accidentally publish session keys. Also, because the skill uploads local files, the API key grants the service access to any uploaded data.
Persistence & Privilege
The skill is instruction‑only, has no install spec and does not request always:true or other elevated persistence. It does not attempt to modify other skills or system settings according to the provided metadata.
Assessment
This skill appears to do what it says: it uses a CellCog SDK to upload files and produce multi‑modal deliverables. Before installing/using it: 1) Understand that any file you reference with <SHOW_FILE> will be transmitted to CellCog's servers (check company policy and data sensitivity). 2) The SKILL.md suggests `pip install cellcog` — review the PyPI package/source or install in an isolated environment (virtualenv/container) before running. 3) Use a least‑privilege API key (rotate/revoke if needed) and verify billing/credit implications. 4) Be careful with OpenClaw session keys used as notify_session_key — treat them as sensitive and do not paste them into public prompts. If you need higher assurance, ask the publisher for a vetted install package, a link to the SDK source repo, or documentation on data handling and retention.

Like a lobster shell, security has layers — review code before you run it.

latestvk974ygnzd8bffehrv0za6ssyzd84f4cw

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧠 Clawdis
OSmacOS · Linux · Windows
Binspython3
EnvCELLCOG_API_KEY

Comments