Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Linkedin Comment Drafter

v1.0.0

Drafts 1-3 tailored, high-engagement LinkedIn comment options from a post URL using proven 2026 templates and awaits user approval before posting.

0· 32·0 current·0 all-time
bySergey Bulaev@sergebulaev
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoCan make purchasesRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The declared purpose (draft LinkedIn comments and optionally post them) aligns with the SKILL.md steps (parse URL, draft templates, present for approval, post). However the SKILL.md expects integration points (Publora, a custom poster, and an internal HarvestAPI path) that are not declared in the registry metadata (no required env vars or config paths). Mentioning these backends is plausible for the stated purpose, but the skill should have declared any credentials/config it expects.
!
Instruction Scope
Instructions ask the agent to parse LinkedIn URLs, fetch post text and top-3 comments (via an internal HarvestAPI path if available), and call library helpers (lib.url_parser, lib.approval.render_approval_card, lib.PubloraClient.create_comment, lib.active_backend()). These references go beyond pure drafting: they expect access to internal libraries and to programmatic posting. The fallback to asking the user for post text reduces risk, but the unqualified use of internal paths and posting libraries is a scope creep / transparency issue.
Install Mechanism
Instruction-only skill with no install spec or downloadable code. That minimizes disk-write/installer risk.
!
Credentials
Registry lists no required env vars, but SKILL.md refers to PUBLORA_API_KEY and LINKEDIN_SKILLS_CUSTOM_POSTER (and expects lib.PubloraClient when PUBLORA_API_KEY is set). It also references an internal HarvestAPI module path. Requesting posting credentials and pointing to corporate modules without declaring them is inconsistent and could lead to credential misuse if granted inadvertently.
Persistence & Privilege
The skill is not always-enabled and is user-invocable; autonomous invocation is allowed (platform default). If posting credentials (e.g., PUBLORA_API_KEY) are provided, the agent could perform network actions to react and post — so granting posting credentials increases potential impact. The skill itself does not request persistent install or system-wide changes.
What to consider before installing
Key things to check before installing or enabling this skill: - Confirm how posting is performed: ask the publisher what 'Publora' is, where posts go, and whether the skill will ever post without an explicit, per-use approval. The SKILL.md refers to PUBLORA_API_KEY but the registry metadata does not declare it — don't provide credentials until you verify the backend and its privacy/security policies. - Verify the existence and provenance of the referenced libraries (lib.url_parser, lib.PubloraClient, lib.approval, and the HarvestAPI path). These look like internal helpers; if they aren't present the skill should fall back to manual mode only. - Prefer to run this skill in manual mode (copy-paste drafts) until you can inspect the code that implements the Publora/custom-poster backends. Ensure any custom poster command you configure is safe and sanitized (it will receive the draft text and target URL as args). - Be cautious about the HarvestAPI/internal path: it suggests the skill can access corporate/personal knowledge stores if available. Understand what data would be read and whether that access is permitted. - Ask the publisher for source code or a homepage. Instruction-only skills can be helpful but when they reference unspecified credentials and internal modules, that inconsistency should be resolved before granting any secrets or allowing automated posting.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f2nvdd6sjjxymczv9rrazbh84vqxklinkedinvk97f2nvdd6sjjxymczv9rrazbh84vqxkmarketingvk97f2nvdd6sjjxymczv9rrazbh84vqxksocial-mediavk97f2nvdd6sjjxymczv9rrazbh84vqxk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments