Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Visual Summarization Skill | 视觉摘要智述技能
v1.0.1Performs AI analysis on input video clips/image content and generates a smooth, natural scene description. | 视觉摘要智述技能,对传入的视频片段/图片内容进行AI分析,生成一段通顺自然的场景描述内容
⭐ 0· 24·0 current·0 all-time
by生命涌现@raymond758
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill claims to produce visual summaries and the code implements API calls and formatting for that. However the package also bundles a large shared library (skills/smyx_common) and a separate face-analysis skill (TCM face diagnosis) — reuse is plausible, but including a full DAO/SQLite stack and many unrelated utilities is heavier than expected for a simple video→text summarizer.
Instruction Scope
SKILL.md imposes strict runtime rules (forbids reading local 'memory' files and mandates obtaining open-id from specific config paths) yet the code actively loads local config.yaml files and the shared library can create/read local DB/config under the workspace. SKILL.md also says uploaded attachments will be saved to an attachments directory, but the main script does not appear to implement explicit attachment saving — instructions and code are not fully consistent.
Install Mechanism
There is no install spec (instruction-only at registry level) but the bundle contains many Python modules and a large requirements.txt in skills/smyx_common. That means heavy dependencies are implied but not automatically installed by the registry manifest — unexpected runtime failures or a large attack surface if dependencies are later installed automatically.
Credentials
The registry declares no required environment variables, but the code reads environment variables (OPENCLAW_SENDER_OPEN_ID, OPENCLAW_SENDER_USERNAME, FEISHU_OPEN_ID, OPENCLAW_WORKSPACE) and will write/read local config and a SQLite DB under the workspace/data path. The skill also expects API keys and base URLs from skills/smyx_common config.yaml (which contains base URLs pointing to lifeemergence.com). The mismatch between declared requirements (none) and actual env/config access is concerning.
Persistence & Privilege
always:false (good), but the code will create/read local files (config YAMLs, a SQLite DB in workspace/data) and may persist analysis records. It does not request to modify other skills, but it does have local persistence and expects workspace write access.
What to consider before installing
What to check before installing or enabling this skill:
- Review and trust the remote API endpoints in skills/smyx_common/scripts/config.yaml (base-url-open-api, base-url-health). The default config points to lifeemergence.com — confirm that is expected and trustworthy.
- Inspect skills/smyx_common/scripts/util.py (RequestUtil) to confirm what HTTP calls are made, what headers/credentials are sent, and whether any unexpected data exfiltration could occur.
- Be aware the code will read local config.yaml files and may create a SQLite DB under the workspace (workspace/data/*.db). If you need to avoid any local persistence, do not install or run this skill.
- Note the registry metadata declares no required env vars, but the code reads OPENCLAW_SENDER_OPEN_ID, OPENCLAW_WORKSPACE and other env vars — supply or restrict these as appropriate and consider running in a sandbox to observe behavior.
- The bundle contains a large 'common' dependency list and an unrelated face-analysis skill; if you only need minimal summarization, ask the author for a slimmer package or examine whether those components are necessary.
- If you will allow autonomous invocation, prefer to run this skill with least privilege: restrict workspace path, run in isolated environment, and avoid giving API keys until you confirm endpoint behavior.
If you want, I can: (1) summarize the external endpoints and files the code will read/write, (2) extract and show the RequestUtil/http call patterns, or (3) point out exact lines where env vars and file writes occur.skills/smyx_common/scripts/config-dev.yaml:2
Install source points to URL shortener or raw IP.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.Like a lobster shell, security has layers — review code before you run it.
latestvk97cy4e7en2p461dzs0v6yztqx845a0j
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
