Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

KYC Vault

v0.2.2

Automates KYC identity verification by securely managing and submitting identity documents. Always asks user permission before accessing or uploading any fil...

0· 263·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to use a local vault at ~/identity-vault/ and to read manifest.json and user documents to complete KYC flows. However, the registry metadata lists no required config paths or required binaries and no primary credential — yet the SKILL.md explicitly depends on local filesystem access and browser automation to upload files. The skill therefore assumes capabilities (local file access, browser control) that are not declared in the manifest metadata.
Instruction Scope
SKILL.md narrowly defines steps, permission prompts, and domain verification, and it insists on asking the user before reading or uploading any file. That is good practice. However, because this is an instruction-only skill with no code, these are just behavioral rules the agent is told to follow — the platform must actually enforce/observe those prompts. The instructions also require reading sensitive local data (personal_info in manifest.json) and performing uploads to external sites, which are high-sensitivity operations and should be treated carefully.
Install Mechanism
No install spec and no code files — instruction-only — so nothing is automatically downloaded or executed by the skill. The README contains a curl example to fetch a manifest template from raw.githubusercontent.com, but that is a user-run step, not an automated install action.
Credentials
The skill requires no environment variables or external credentials (proportionate). However it requires the user to place highly sensitive documents and personal_info into ~/identity-vault/ (manifest.json). That sensitivity is expected for the stated purpose but is not reflected in the registry's declared config path fields — an inconsistency the user should note.
Persistence & Privilege
always is false and there's no indication the skill requests persistent or system-wide privileges. It does not declare modifying other skills or system settings.
What to consider before installing
This skill's behavior (reading manifest.json and uploading identity documents) matches its stated purpose, but there are important mismatches and risks you should consider before installing: - The SKILL.md expects the skill/agent to access ~/identity-vault/ and to control a browser to upload files, but the registry metadata did not declare any required config paths or binaries. Ask the publisher or platform: how does the agent obtain permission to access your filesystem and browser? Are the in-chat confirmation prompts enforced by the platform or just guidelines the skill 'should' follow? - The skill will work with highly sensitive personal data (full name, DOB, passport images, etc.). Only use if you are certain the agent/process that executes skills runs locally and does not leak files to external servers. Review the platform's privacy model and logs. - Test first with dummy data: create a fake ~/identity-vault/ and manifest.json containing non-sensitive placeholders and run the flow against a non-production URL to confirm the agent prompts for every file and domain as promised. - Inspect manifest.json and the vault contents yourself before allowing any uploads, and never use this skill until you confirm the platform enforces the explicit confirmation steps (domain confirmation, per-file approval, final submit). If the platform cannot or does not enforce those prompts, do not store real identity documents in ~/identity-vault/ or use this skill. If you want, I can draft questions to ask the skill author or the platform operator to clarify the missing declarations (config paths, required capabilities) and how confirmations are enforced.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c7388nv3m407z8dpvwghzts82gczk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments