Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
News Summary
v0.1.0Tổng hợp tin tức từ Báo Mới, VnExpress, Tuổi Trẻ, Dân Trí — gửi qua Telegram với link bài viết. Dùng khi: tổng hợp tin tức hàng ngày, setup bot tin tức Teleg...
⭐ 0· 95·0 current·0 all-time
by@padit69
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description match the code: Python main script fetches RSS and a Playwright-based JS scraper fetches Báo Mới, then sends a formatted HTML message to a Telegram bot. The included files are appropriate for the stated task.
Instruction Scope
Runtime instructions are explicit about where to put config.json (botToken, chatId) and how to run. However the code searches multiple locations for config.json including /home/pc999/.openclaw/workspace/config.json and ~/.openclaw/workspace/config.json — i.e., it will look outside the skill directory and may pick up a config file from the user's broader workspace. The code also runs a Node scraper via subprocess and downloads site contents (expected for scraping).
Install Mechanism
There is no platform install spec in the registry, but an included install.sh performs setup checks, creates directories and a config example, and attempts to automatically add a cron job. Playwright/browser binaries are required (npm / npx playwright install chromium) which will download browser artifacts. No external/personal URLs or obfuscated installers are used.
Credentials
The skill does not declare required env vars in metadata, but it requires a config.json containing a Telegram bot token and channel id — this is proportional. Concern: both config_reader.py and news_summary_v2.py probe multiple global paths (including user-specific OpenClaw workspace paths) when locating config.json, which could cause accidental use/exposure of unrelated config files/tokens present on the system.
Persistence & Privilege
install.sh will add a cron entry to the user's crontab automatically (it checks and appends a line). Adding a scheduled job is a persistence action and can be surprising if run without review. The skill also creates logs and workspace directories. always:true is not set, but the automatic crontab modification is a notable privilege.
What to consider before installing
This skill appears to do what it says (scrape news sources and post to a Telegram channel) but review and control installation steps before running. Specific recommendations:
- Inspect config.json.example and create a config.json in the skill's scripts/ directory with only botToken and chatId. Do not place sensitive credentials in global ~/.openclaw/workspace/ unless intended.
- Before running, open scripts/install.sh and scripts/news_summary_v2.py and confirm any hardcoded paths (e.g., /home/pc999 or a specific nvm node path) are acceptable for your environment.
- install.sh will append a cron job to your crontab automatically; if you prefer manual control, skip install.sh and add the cron line yourself or run the script manually from a supervised session.
- Playwright requires Node and will download browser binaries (npx playwright install chromium). If you are on a restricted environment, be aware of this network/download step.
- Because the code searches multiple workspace paths for config.json, ensure there are no other JSON files with keys named botToken in those locations that could be picked up accidentally.
If you want lower-risk usage: run python3 scripts/news_summary_v2.py interactively after creating a local config.json in the same scripts/ folder and do not run install.sh; confirm Telegram messages go only to the channel you configured.Like a lobster shell, security has layers — review code before you run it.
latestvk978ybmjyr4e5j71e6w3wekd1h83aqy0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
