Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Document Ingestion
v1.0.2Process raw accounting source documents (PDFs, CSVs, bank statements, invoices, receipts) into standardized transaction records for QBO import. Use when batc...
⭐ 0· 142·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill's stated purpose (convert accounting docs into QBO import CSVs) is reasonable, but the SKILL.md expects live QBO Chart-of-Accounts access and a Node.js QBO client with an auth token while the registry metadata declares no required environment variables or primary credential. The skill also references a local Python script path (scripts/pipelines/document-ingestion.py) and client-specific local files (clients/{slug}/...) that are not provided in the bundle.
Instruction Scope
Runtime instructions direct the agent to run a local Python script, read directories and client mapping files, write outputs to ~/Desktop and .cache/document-ingestion/{slug}.json, and optionally contact QBO (including sandbox). The SKILL.md also refers to 'Auth token must be configured' but does not specify how or which env var. These instructions access local filesystem paths and external APIs beyond what the registry declares.
Install Mechanism
This is an instruction-only skill (no install spec, no code files). The SKILL.md lists pip packages and Homebrew (tesseract) as required/optional installs — that's a manual installation expectation but the registry provides no automated install. Because no script files are included, following the instructions would fail unless the user separately obtains the referenced scripts.
Credentials
The runtime behavior implies need for QBO credentials (auth token) and possibly other secrets for a Node.js QBO client, but requires.env is empty and no primary credential is declared. It also reads/writes local files (client maps, caches, Desktop outputs). Requesting QBO access is proportionate to purpose only if the skill declares which credentials it needs and why; here that mapping is missing.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges. However, it will create/modify local cache files (.cache/document-ingestion/...), read client config files, and write Excel/CSV outputs to user directories (default ~/Desktop). These are normal for such a tool but should be confirmed before running.
What to consider before installing
Red flags to consider before installing/using this skill:
- The SKILL.md expects you to run a local script at scripts/pipelines/document-ingestion.py and to have client mapping files (clients/{slug}/...) but the published bundle contains no code — ask the publisher for the script and full source before trusting it.
- The skill clearly needs a QBO auth token (and mentions a Node.js QBO client) but the registry lists no required environment variables or credential names; ask which exact credentials are needed and how to scope/restrict them (use a sandbox token with minimal scope for testing).
- The instructions will read your local folders and write outputs and caches (~/Desktop, .cache/document-ingestion). If you plan to run anything from an unreviewed source, do so in an isolated environment (VM/container) and inspect the code first.
- The skill recommends installing third-party tools (tesseract, pdfminer.six, ofxparse). Install these only from official sources and be cautious about permissions.
- If you want to proceed: obtain the actual script source, verify where the QBO token is read (which env var or config file), review vendor maps and any pre-mapped vendor list for privacy issues, and test with non-sensitive sample documents in QBO sandbox mode.
If the publisher cannot provide the missing script and explicit credential/config instructions, treat this skill as incomplete and avoid running it on real financial data.Like a lobster shell, security has layers — review code before you run it.
latestvk977k6z3n231tync81r2zr38jx83d55n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📄 Clawdis
