Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

智能文档处理助手

v1.0.1

智能文档处理助手 - 一站式文档处理工具,支持 PDF 转换、智能摘要、多语言翻译、格式转换等功能。自动提取关键信息,生成结构化报告,提升文档处理效率10倍。

0· 76·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Declared purpose (PDF extraction, summarization, translation, entity extraction) aligns with the provided process.mjs which implements extract/summarize/translate functionality and requires node + pdftotext. pdftotext use is justified for PDF text extraction.
!
Instruction Scope
SKILL.md and README contain examples that call separate scripts (summarize.mjs, translate.mjs, extract.mjs) which are not present in the package; the actual implementation is a single scripts/process.mjs driven by --action. This documentation mismatch could cause an agent or user to look for or attempt to fetch additional code. The translate path is a placeholder (no external translation API calls are made), so no network exfiltration is visible in the code.
Install Mechanism
No install spec is provided (instruction-only with bundled code). No external downloads or archive extraction are used. This minimizes install-time risk.
Credentials
The skill requests no environment variables, no credentials, and the script does not read secrets from the environment. The required binaries (node, pdftotext) are appropriate and used in the code.
Persistence & Privilege
Skill is not always-enabled and does not request elevated or persistent privileges. It does not modify other skills or system configuration.
What to consider before installing
What to consider before installing: - Documentation mismatch: SKILL.md shows separate scripts (summarize.mjs, translate.mjs, extract.mjs) but the package contains only scripts/process.mjs which supports actions via --action. Treat the single process.mjs as the real entrypoint; the extra examples are likely stale docs but could cause confusion. - No secret access: the code does not request or read credentials or environment secrets, and it does not call external APIs for translation (translation is a placeholder). Still, inspect any later updates that add network or API calls before sending sensitive documents. - Local-only operation: pdftotext is invoked through child_process.execSync to extract PDF text; this is expected but means the binary must be present on the host. Run the tool on non-sensitive sample documents first. - Safety steps: review scripts/process.mjs locally (already provided), run in an isolated environment (container or VM), and search the repo for any network calls or hidden endpoints before processing confidential files. If translation features are important, verify which translation API the skill integrates with (if any) and ensure you consent to any external data transmission. Overall: the implementation appears coherent with its stated purpose, but the documentation inconsistencies justify caution (test in a sandbox and review code) before using on sensitive data.
scripts/process.mjs:138
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk976std4tcp7atzre8ph2p2sfx83a7dm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📄 Clawdis
Binsnode, pdftotext

Comments