我的测试
WarnAudited by ClawScan on May 18, 2026.
Overview
The skill’s purpose is understandable, but it asks you to run an unreviewed Python script that handles login credentials and saves a reusable browser session.
Before installing or running this skill, obtain and inspect save_session.py and the credential file format, confirm the exact outbound-system URL/account scope, run it only from a trusted project directory, and keep login_credentials.json and auth.json out of source control with restrictive file permissions. The artifacts do not show exfiltration or destructive behavior, but the unreviewed credential/session-handling script makes this a Review item.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A saved auth.json can allow later automation to act as the logged-in user; if the script or file is mishandled, account access could be exposed or misused.
This directs the skill to use local account credentials and persist a logged-in browser state. The reviewed registry data declares no primary credential or required config path, and the provided artifacts do not include the code that handles those credentials.
在项目根目录准备凭证文件 `login_credentials.json` ... 脚本会自动打开登录页并填写账号密码 ... 登录成功后,脚本会自动保存 `auth.json`
Do not run it until save_session.py and the credential format are reviewed; declare the required credential/config path, limit the target site/account, and protect, rotate, or delete auth.json when appropriate.
The actual script run on the machine could perform actions beyond the documented login/session save, and the supplied artifacts do not let ClawScan verify its endpoints or file handling.
The skill requires running a helper script that is not included in the provided file manifest/code review, so the credential-handling and session-saving behavior depends on unreviewed local code.
运行: `python3 save_session.py` ... ## 依赖文件 - `save_session.py` - `login_credentials.json`
Ship and review save_session.py, or pin a trusted source/checksum, before use; avoid running a same-named local script unless its contents are known.
A stale, copied, or tampered session file could make future tasks run under the wrong or unauthorized logged-in state.
The skill intentionally creates persistent authenticated browser state for reuse by later outbound skills, which is purpose-aligned but sensitive.
记录当前浏览器登录态,输出 `auth.json` 给后续外呼技能复用。
Store auth.json in a restricted, non-committed location, validate the target URL/account before reuse, and remove it when no longer needed.
