Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
AccessMind
v6.0.0Enterprise WCAG 2.2/2.1/EN 301 549 accessibility audit platform. OpenClaw Browser Tool ile entegre çalışan, güvenli ve profesyonel erişilebilirlik denetim si...
⭐ 0· 117·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name, description, SKILL.md and the included files (content/background/devtools scripts, many Python audit scripts) are consistent with an accessibility auditing tool. The declared dependency on python3 and Python parsing packages aligns with the presence of many Python scripts. However, the code contains a hard-coded absolute path to a user's workspace (/Users/sarper/.openclaw/...), which is unusual for a general-purpose skill and suggests the package was packaged from a specific developer environment without path generalization.
Instruction Scope
Content/background scripts gather full page HTML, images, element attributes, form inputs and take screenshots; they also store behavioral event logs in chrome.storage.local and can export them. While this data collection is plausible for an auditor, it can capture sensitive information (page HTML, input names/values, screenshots). SKILL.md does not explicitly warn about collecting page HTML/screenshots or export behavior; background.js also attempts to send images and URLs to local endpoints (OpenClaw Gateway / Ollama). The presence of many shell scripts (.sh) and Python scripts that appear to implement crawling and auditing means the skill can perform network requests, write output files, and run system commands if executed—this expands the runtime surface beyond the simple browser actions shown in SKILL.md.
Install Mechanism
There is no install spec (instruction-only), which reduces automated installation risk. However, the repo includes many executable artifacts (multiple .py and .sh scripts) and a browser extension. Those files will be written to disk when the skill is installed by the platform and could be executed later. No external download URLs are used (good), but the presence of shell scripts (audit-page.sh, full-audit.sh, stealth-audit.sh) and scripts that may spawn processes means users should review them before running. The background script also expects local services (OpenClaw Gateway, Ollama) to be present.
Credentials
The skill declares python3 and Python parsing libraries (beautifulsoup4, lxml, html5lib) — reasonable for web crawling and HTML analysis. It does not request environment variables, cloud credentials, or unrelated secrets. The only surprising element is reliance on local services (localhost:8765, localhost:11434) and a hard-coded developer workspace path; these are not environment variables but are environment-dependent and may fail or leak data if pointed incorrectly.
Persistence & Privilege
always is false (normal). The Chrome extension code stores behavioralEvents in chrome.storage.local (up to 1000 events) and exposes an export function; it also logs operations and may create reports on disk via Python scripts. That is expected for an audit tool, but it means persistent storage of potentially sensitive page data. The skill does not declare modifying other skills or system-wide configurations, but the hard-coded absolute paths and included shell scripts mean a careful review of what those scripts write or execute is recommended.
What to consider before installing
What to check before installing:
- Inspect the hard-coded path (/Users/sarper/.openclaw/...) in extension/background.js; it should be replaced with a configurable path or discovered dynamically. Hard-coded user paths can cause failures or accidentally point to sensitive files.
- Expect the extension to collect full page HTML, screenshots, images, and form element metadata (names/labels). If you will run audits on pages that contain sensitive data, be cautious — exported audit artifacts could include sensitive content.
- The skill talks to local services (OpenClaw Gateway at 127.0.0.1:8765 and an Ollama-like API at 127.0.0.1:11434). Verify you are comfortable running those local services and that they are configured to accept only local connections.
- Review the included shell scripts (.sh) and Python scripts before running them. They perform crawling and reporting and may invoke system commands or write files. Prefer to run them in a controlled environment (isolated VM or container) first.
- Confirm whether the extension is the only component that will execute automatically; the repository contains many scripts that likely require manual execution. If you do not want background local servers or files written to disk, do not run those scripts.
- If you intend to use this on enterprise or sensitive sites, get written assurances (or source review) that exported reports and stored event logs will not be transmitted to remote servers. The code appears to use only localhost endpoints, which is better than unknown remote endpoints, but verify at runtime.
If you want, I can: (1) point to the exact lines that reference the hard-coded path and localhost endpoints; (2) summarize what each .sh and top Python script does so you can decide which to allow; or (3) suggest a minimal, safer configuration for running audits (e.g., run in a disposable VM and disable export/auto-tracking).Like a lobster shell, security has layers — review code before you run it.
accessibilityvk97d7361fqkqj6haffss53ke6583hqn4auditvk97d7361fqkqj6haffss53ke6583hqn4cloudflare-bypassvk97d7361fqkqj6haffss53ke6583hqn4element-testingvk97d7361fqkqj6haffss53ke6583hqn4glm-5vk9761t3hzvavh3ctv96hfvnq8183hzgdkeyboard-simulationvk97d7361fqkqj6haffss53ke6583hqn4langgraphvk9761t3hzvavh3ctv96hfvnq8183hzgdlatestvk972frrwvwabzj8sndckfqgd9n83n7ypollamavk9761t3hzvavh3ctv96hfvnq8183hzgdpytestvk97d7361fqkqj6haffss53ke6583hqn4wcagvk97d7361fqkqj6haffss53ke6583hqn4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspython3
