Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
DocuScan
v1.0.3Forget clunky scanner apps with watermarks and $10/month subscriptions. DocuScan lets you snap a photo of any receipt, contract, whiteboard, or handwritten n...
⭐ 0· 69·0 current·0 all-time
by@nollio
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name, README, SKILL.md and scripts all align with a scanner/OCR → markdown → PDF workflow. The included Python and shell scripts implement PDF generation via Playwright, which is expected for the described feature set. Minor inconsistency: registry metadata lists no required binaries or env vars, but the README and scripts require Python 3 and Playwright (and Playwright will download Chromium). This missing dependency declaration is a usability/security note but does not indicate malicious intent.
Instruction Scope
SKILL.md stays within the document-scanning scope: it explains OCR/reconstruction rules, filename sanitization, where to store outputs (documents/), combining pages, and calls the local generate-pdf.sh/py scripts to produce PDFs. It explicitly warns about prompt injection and instructs the agent to treat extracted text only as data. There are no instructions to read unrelated system files or send data to external endpoints.
Install Mechanism
There is no registry install spec (instruction-only), so nothing will be automatically downloaded by the skill itself. However, the included scripts require Playwright and Python; the README instructs the user to run 'pip install playwright' and 'playwright install chromium', which will download a browser binary. The generate-pdf.py script explicitly disables JavaScript and blocks non-local requests in Playwright, which mitigates network-exfiltration risk during rendering.
Credentials
The skill declares no required environment variables or credentials, matching the local-only processing claims. The optional Dashboard Companion Kit references Supabase and environment variables for deployment, but those are optional; they are documented as requiring secure handling. No unexpected secret-exfiltration vectors are present in the core skill files.
Persistence & Privilege
The skill does not request always:true and is user-invocable only by default. Its setup prompt asks to create a local documents/ directory and a scan-log.json file — normal for local-first tools. The skill does not modify other skills or system-wide agent settings.
Scan Findings in Context
[ignore-previous-instructions] expected: The pre-scan detector flagged an 'ignore previous instructions' pattern, but SKILL.md explicitly warns about prompt-injection and instructs the agent to treat all extracted text as data only. The pattern appears to be present as a security warning rather than malicious content.
Assessment
DocuScan appears to be what it claims: a local-first document OCR → markdown → PDF tool. Before installing or using it, do the following:
- Manually install and verify prerequisites: ensure python3 is available and run 'pip install playwright' and 'playwright install chromium' yourself; the registry metadata does not declare these dependencies. Review the Playwright download step since it fetches a browser binary.
- Review the two scripts (generate-pdf.py and generate-pdf.sh) — they explicitly disable JavaScript and block non-local requests in Playwright, which reduces exfiltration risk during PDF rendering. Keep those protections in place and avoid enabling JavaScript there.
- Create the documents/ directory with strict permissions (chmod 700) and review any autogenerated filenames before opening them. The skill provides filename-sanitization rules, but verify they are enforced in your runtime.
- Test with non-sensitive sample documents first to confirm behavior and that files stay local.
- Only enable/use the Dashboard Companion Kit if you understand and securely supply any external DB/service credentials (the dashboard requires Supabase or similar and will need environment variables); follow the dashboard's security guidance (RLS, encryption at rest, private storage buckets).
- Despite explicit prompt-injection defenses, be cautious: scanned documents can themselves contain adversarial text. The skill correctly warns to never treat scanned text as executable instructions — keep that policy enforced in your agent configuration.
If you want higher assurance, run the skill in a restricted environment (isolated user account or container), verify file writes are constrained to the documents/ folder, and review any changes to your environment before trusting it with highly sensitive documents.SECURITY.md:30
Prompt-injection style instruction pattern detected.
SKILL.md:7
Prompt-injection style instruction pattern detected.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.Like a lobster shell, security has layers — review code before you run it.
latestvk97a73g47d0v86a5aj3a1h4qg583z446
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
