douyin-to-obsidian
Analysis
The skill appears to perform its stated Douyin-to-Obsidian task, but it uses anti-bot bypass techniques and automatically installs an unverified FFmpeg executable, so users should review it carefully before running it.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
ffmpeg_url = "https://www.gyan.dev/ffmpeg/builds/ffmpeg-release-essentials.zip" ... requests.get(ffmpeg_url, stream=True) ... zip_ref.extract(name, cache_dir) ... os.environ["PATH"] = str(cache_dir) + os.pathsep + ...
On first Windows run, the skill downloads a third-party executable archive, extracts/copies FFmpeg into a persistent cache, and prepends it to PATH; the artifacts do not show checksum or signature verification.
args=[ '--disable-blink-features=AutomationControlled', '--disable-web-security' ] ... Object.defineProperty(navigator, 'webdriver', {get: () => undefined});The browser automation is configured to evade automation detection and relax browser security while scraping Douyin, matching the advertised risk-control bypass behavior.
base_dir = r"E:\icloud\iCloudDrive\iCloud~md~obsidian\myobsidian" ... with open(full_path, "w", encoding="utf-8") as f:
The script writes directly to a default iCloud-backed Obsidian vault path using write mode, so a same-title transcript can overwrite an existing note and then sync.
