Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
ifly-voiceclone-tts
v1.0.0iFlytek Voice Clone tts(声音复刻) — train a custom voice model from audio samples and synthesize speech with the cloned voice. Supports the full workflow: get tr...
⭐ 0· 100·0 current·0 all-time
byIflytek AIcloud@qingzhe2020
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill's name and description match the included script: it implements iFlytek voice training and TTS. However the published registry metadata lists no required environment variables or primary credential while both SKILL.md and the script require IFLY_APP_ID, IFLY_API_KEY, and IFLY_API_SECRET. That metadata omission is an incoherence and should be corrected/clarified.
Instruction Scope
Runtime instructions are narrowly scoped to the voice-training/synthesis workflow, but the implementation sends authentication data to HTTP endpoints (TRAIN_BASE_URL and AUTH_TOKEN_URL are http://) and uses a WebSocket client that disables certificate validation (ssl.CERT_NONE and check_hostname=False). These make secret transmission and TLS integrity vulnerable to interception. The skill also allows uploading audio by URL (it may fetch arbitrary URLs) which is expected for upload but increases network exposure.
Install Mechanism
No install spec; the skill is an instruction + a single Python script using only the stdlib. Nothing is downloaded or extracted at install time, so installation risk is low.
Credentials
The code and SKILL.md require three credentials (IFLY_APP_ID, IFLY_API_KEY, IFLY_API_SECRET). That is proportionate to calling iFlytek APIs, but the registry metadata does not declare them (mismatch). More importantly, those secrets are transmitted to HTTP endpoints and used in client-side signing — sending them to plaintext HTTP endpoints risks exposure. The script also prints/writes output audio files (expected).
Persistence & Privilege
The skill does not request persistent/always-on privileges and does not modify other skills or system-wide config. Autonomous invocation is allowed (platform default) but not combined with other privilege escalations.
What to consider before installing
This skill implements the claimed iFlytek voice-cloning workflow, but there are important warnings before you install or use it:
- The skill requires API credentials (IFLY_APP_ID, IFLY_API_KEY, IFLY_API_SECRET) even though the registry metadata didn't list them. Don't provide keys unless you trust the code and owner.
- The script talks to training endpoints over plain HTTP and disables TLS verification for the TTS WebSocket. That means your API keys and data could be intercepted on the network. Avoid using production/privileged keys; prefer a throwaway/test account and run only on a trusted network.
- The code will fetch audio by URL if you pass --audio-url; that can cause network I/O from arbitrary hosts. Consider running in an isolated environment (VM/container) if you don't fully trust the source.
- If you need to proceed: review the full script yourself (or ask the publisher to fix metadata), confirm endpoints are the official iFlytek endpoints, and ideally patch the code to use HTTPS for token/train endpoints and to enable proper certificate validation for the WebSocket.
If you want, I can list the exact code lines that disable TLS verification and where the HTTP endpoints are used so you can request fixes or make the patch yourself.Like a lobster shell, security has layers — review code before you run it.
latestvk97b6y74pf6ew4ae1d49ax048d835t5r
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
