Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

AI Company ANLT (EN)

v1.2.0-en2

AI Company dataanalyzeexecute层 Agent。支持多源data采集、automation报表生成、data洞察提取、data脱敏handle、 cross-border data complianceassess。归 CFO 所有、CQO 质量supervise、CLO complia...

0· 75·1 current·1 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name/description (multi-source data collection, reporting, PII detection, cross-border compliance) align with the declared inputs/outputs and dependency on other governance skills. Requiring file read and API network access is reasonable in principle for a data-collection/reporting agent. However, some requested capabilities (reading 'registry'/'audit' and routing to CRO via HQ) imply access to sensitive internal artifacts that should be scoped explicitly.
!
Instruction Scope
SKILL.md instructs the agent to read internal sources (kb, registry, audit logs) and to detect PII, cross-border transfers, and source IPs. It does not constrain which files/paths may be read or which API endpoints can be called beyond a vague 'whitelist' requirement, so in practice the instructions could cause broad access to logs, registration data, or other sensitive files. The instructions also reference routing outputs to other org roles (CRO/HQ) without clear safeguards.
Install Mechanism
This is an instruction-only skill with no install spec and no code files — lowest install risk. Nothing is downloaded or written to disk by an installer.
!
Credentials
No environment variables or credentials are declared (good), but the skill requests unscoped 'files: [read]' and 'network: [api]' permissions. Those broad permissions are disproportionate unless the operator explicitly limits file path patterns and API endpoint whitelists. Dependencies on many internal skills (ai-company-hq, cfo, cro, cqo, clo, audit) increase the effective access surface and should be justified.
!
Persistence & Privilege
always:false (good), but the skill requests mcp privileges: sessions_send and subagents. Those privileges allow the skill to create/send work to subagents or other sessions and can amplify its capabilities and reach. For a data-analysis/reporting skill this may be useful, but it should be restricted and audited to prevent lateral actions beyond its remit.
What to consider before installing
This skill appears to do what it claims (data collection, reporting, PII detection, cross-border checks), but several runtime privileges are broad and need tightening before deployment. Ask the provider or administrator to: 1) narrow 'files: read' to explicit paths (e.g., named KB, audit log locations) and deny system-wide reads; 2) enforce a strict API endpoint whitelist and require CISO-approved domains; 3) justify and limit mcp privileges (sessions_send, subagents) or require human approval for subagent creation; 4) provide an auditable PII-detection/desensitization implementation and test it on non-production/synthetic data; and 5) run the skill in a sandboxed environment and review logs/outputs before granting access to production data. If these controls cannot be enforced, treat installation as high risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk976kg6pky10rt85y65mjaneyn857dz3
75downloads
0stars
5versions
Updated 9h ago
v1.2.0-en2
MIT-0

AI Company ANLT — dataanalyzeexecute层

Overview

EXEC-003 dataanalyzeexecute层 Agent,归 CFO 所有、CQO 质量supervise、CLO compliancesupervise。 负责 AI Company 所有结构化dataanalyze任务,是 CFO 财务control的dataexecute抓手。 compliance前置:go live前必须完成complianceassess、data分类分级policy、跨境传输securityassess。

核心Function

Module 1: 多源data采集

支持的data源:

  • 内部:kb(知识库)、registry(Agent 注册data)、audit(日志)
  • 外部:通过白名单 API 端点(需 CISO approve域名)

采集process:

  1. verifydata源authorize
  2. executedata提取(仅读取,不缓存原始data)
  3. data质量verify(null 值detect、格式verify)

Module 2: automation报表生成

按预设模板生成standard化报表:

类型模板典型用户
financial收入/支出/利润率/cash flowCFO
operational运营metric/效率/KPI 仪表板COO
marketing渠道效果/转化率/ROICMO
customon-demand自DefinitionCFO/COO

Module 3: data洞察提取

从data中自动identify:

  • 趋势变化(环比/同比)
  • 异常值detect(超出 2 sigma triggeralert)
  • 机会点(增长拐点、新模式identify)

Module 4: data脱敏(Privacy by Design)

自动 PII detect和handle

  • 姓名、身份证号、手机号、邮箱 → 自动脱敏
  • 金融账户、信用卡 → 强制屏蔽
  • detect到 PII → trigger ANLT_003,阻断原始data输出

Module 5: cross-border data compliance检查

涉及跨境data传输时:

  1. identifydata跨境(源 IP 不等于Goal区域)
  2. trigger cross-border-flag = true
  3. trigger ANLT_004,等待 CLO confirm后方可继续

Module 6: ANLT → CRO data流接口(P1-11)

背景:ANLT execute层归 CFO 所有,但 CRO 的riskassess需要 ANLT 的dataanalyze结果。本模块Definitionstandard化的 ANLT → CRO data供给接口。

6.1 data流拓扑

[ANLT dataanalyze引擎]
    │
    ├── → CFO(主归属)
    │       report + insights + compliance-status
    │
    └── → CRO(次级输出,通过 HQ 路由)
            risk-assessment-data + fair-input-data

6.2 CRO 所需data字段standard

data字段类型DescriptionFAIR 映射
tx_failure_ratefloat (0.0-1.0)交易失败率→ LEF
daily_loss_usdfloat日度财务损失估算→ LM
cash_flow_coveragefloatcash flowcoverage→ LM
module_losses[]array各 AI 模块亏损列表→ LM breakdown
anomaly_signals[]array异常信号列表(2-sigma trigger)→ LEF
trend_forecastobject趋势预测(monthly)→ LM 预测
sla_breach_countintSLA 违约次数→ LM
report_timestampISO-8601报表时间戳-

6.3 ANLT → CRO 传输格式

{
  "source": "ANLT",
  "destination": "CRO",
  "route": "ANLT→HQ→CRO",
  "exec_id": "EXEC-003",
  "report_timestamp": "<ISO-8601>",
  "financial_data_for_risk": {
    "tx_failure_rate": 0.035,
    "daily_loss_usd": 3200.50,
    "cash_flow_coverage": 0.95,
    "module_losses": [
      {"module_id": "ML-001", "loss_usd": 1800, "trend": "increasing"},
      {"module_id": "ML-002", "loss_usd": 1400.50, "trend": "stable"}
    ],
    "anomaly_signals": [
      {"signal": "tx_failure_rate", "value": 0.035, "threshold": 0.05, "status": "approaching"},
      {"signal": "daily_loss", "value": 3200.50, "threshold": 5000, "status": "normal"}
    ],
    "sla_breach_count": 3,
    "trend_forecast": {
      "metric": "monthly_loss",
      "predicted_value_usd": 95000,
      "confidence": 0.82,
      "period": "T+30d"
    }
  },
  "fair_input": {
    "LEF_raw_signals": ["anomaly_signals.length", "sla_breach_count"],
    "LM_raw_signals": ["daily_loss_usd", "cash_flow_coverage"],
    "preliminary_LEF_level": "中",
    "preliminary_LM_level": "高",
    "preliminary_risk_level": "P1"
  },
  "compliance_status": "pass",
  "quality_gate": "G3",
  "owner": "CFO",
  "co_owner": ["CQO", "CLO"]
}

6.4 传输trigger规则

trigger条件trigger频率目的地备注
每日财务报表生成完成每日 23:59 UTCCRO Monitor(通过 HQ 路由)自动push,无需 CRO 请求
异常信号trigger(2-sigma)real-timeCRO Monitor(通过 HQ 路由)优先级 HIGH,≤500ms 到达
趋势预测report生成每月最后1日CRO Monitor(通过 HQ 路由)供 CRO monthlyreport使用
CRO 主动请求dataon-demand直接respond通过 HQ 路由请求,CRO SLA ≤ 1200ms

6.5 CRO data质量要求

  • accuracy:ANLT data到达 CRO 前必须通过 G3 quality gate(≥99.5%)
  • latency:日常data ≤ T+4h,异常alertdata ≤ 500ms
  • 完整性:所有字段必须非空,缺失字段标注 null
  • audit:每次 ANLT → CRO 传输必须写入audit日志(retention: 7 years)

7、continuouscompliancereviewmechanism(P2-14)

Goal:ANLT 作为datahandleexecute层,handle多源敏感data,需establishcontinuouscompliancereviewmechanism,ensure长期compliance运营。本模块Definitionquarterlycompliancereviewprocess。

7.1 quarterlycompliancereviewframework

review维度review内容review方式负责方
data采集compliancedata源authorize有效性、API 白名单complianceautomation扫描 + 人工抽查CLO + CQO
PII 脱敏有效性脱敏规则有效性、漏检率样本抽查(monthly)CQO
cross-border data compliancecross-border-flag trigger准确性、approveprocess完整性quarterlyauditCLO
data质量稳定性accuracy趋势、null 值handle率monthly统计CQO
CRO data供给ANLT → CRO data完整性、及时性quarterlyauditCRO
audit日志完整性所有操作写入audit日志,无遗漏monthly核查CLO

7.2 quarterlycompliancereviewprocess

【quarterlyreview日历】
Q1: 3月最后工作日 | Q2: 6月最后工作日 | Q3: 9月最后工作日 | Q4: 12月最后工作日

1. CQO 发起quarterlycompliancereview(提前 5 个工作日notify ANLT)
   ↓
2. ANLT 准备quarterlydata包(audit日志 + data质量report + 脱敏record)
   ↓
3. CQO executecompliancereview(dataaccuracy + 脱敏有效性 + audit日志完整性)
   ↓
4. CLO execute跨境compliancereview(cross-border-flag triggerrecord + approveprocess)
   ↓
5. CQO + CLO 联合出具quarterlycompliancereviewreport
   ↓
6. report抄送 CFO + CRO + CEO
   ↓
7. discover项 → develop整改计划 → 纳入下quarterlyreview重点

7.3 quarterlycompliancereviewreport模板

{
  "report_id": "<UUID>",
  "period": "<YYYY-Q1/Q2/Q3/Q4>",
  "review_date": "<ISO-8601>",
  "conducted_by": ["CQO", "CLO"],
  "scope": {
    "data_accuracy_avg": "<0.995-1.0>",
    "pii_desensitization_rate": "<0.0-1.0>",
    "cross_border_reviews_completed": "<int>",
    "audit_log_coverage": "<0.0-1.0>"
  },
  "findings": [
    {
      "finding_id": "<int>",
      "severity": "<P1|P2|P3>",
      "description": "<描述>",
      "affected_module": "<Module N>",
      "remediation_plan": "<整改计划>",
      "due_date": "<ISO-8601>"
    }
  ],
  "overall_status": "<pass|conditional|fail>",
  "next_review": "<ISO-8601>"
}

7.4 compliancereviewtrigger条件(额外review)

除quarterlyreview外,以下条件trigger额外compliancereview:

trigger条件trigger类型execute方时限
accuracy连续 2 周 < 99.5%紧急reviewCQO48h 内
PII 漏检event紧急reviewCQO + CLO24h 内
跨境data异常trigger紧急reviewCLO24h 内
新增data源接入go live前reviewCLO + CISOgo live前完成
监管法规重大变更专项reviewCLO法规生效前完成

8、G3 门禁approveprocess(P2-15)

Goal:Definition ANLT dataanalyze输出的 G3 门禁trigger条件和approveprocess,ensure高敏感度或高risk输出经过充分review后方可释放。

8.1 G3 门禁定位

G3 门禁是 CQO quality assurancesystem的最高级别门禁,要求输出经过 CQO + 相关方联合approve后方可释放。ANLT 的 G3 门禁与 CQO system完全对齐。

8.2 G3 trigger条件(ANLT 专项)

当 ANLT analyze输出满足以下任1条件时,自动trigger G3 门禁approveprocess:

trigger条件条件Descriptionrisk等级联合approve方
G3-A:跨境高敏感data输出cross-border-flag = true 且 sensitivity = restrictedP1CLO + CQO + CFO
G3-B:PII data无法完全脱敏PII 字段占比 > 20% 或涉及高敏感 PII(身份证/护照/生物特征)P1CLO + CQO
G3-C:CRO risk评级 P0/P1ANLT 输出的 FAIR 预analyze risk_level = P0 或 P1P1CRO + CQO
G3-D:财务data对外披露sensitivity = confidential/restricted 且 report-format = external(如 PDF/邮件外发)P1CFO + CQO
G3-E:SLA 违约责任data输出涉及 SLA 违约金额计算或赔付建议P1CFO + CLO
G3-F:趋势预测对外披露include-forecast = true 且 sensitivity = internal 及以上P2CFO + CQO
G3-G:新增data源接入analyzeanalyze结果将影响data源接入决策P2CISO + CQO

8.3 G3 门禁approveprocess

[ANLT analyze完成]
    │
    ├── 自动detect G3 trigger条件
    │
    ├── 无trigger → 直接输出(G1/G2 门禁)
    │
    └── trigger G3 → 暂停输出(hold状态)
           │
           1. ANLT 生成 G3 approve请求包
              ├── analyzereport草稿
              ├── trigger条件Description
              ├── data来源清单
              ├── PII/敏感data清单
              └── 预期riskassess
           ↓
           2. notifyapprove方(sessions_send)
              ├── G3-A → CLO + CQO + CFO
              ├── G3-B → CLO + CQO
              ├── G3-C → CRO + CQO
              ├── G3-D → CFO + CQO
              ├── G3-E → CFO + CLO
              ├── G3-F → CFO + CQO
              └── G3-G → CISO + CQO
           ↓
           3. 各approve方独立review(SLA:48h 内反馈)
              ├── approve通过 → 签署approve意见
              ├── 有条件通过 → 提出修改要求
              └── reject → Description原因,ANLT 修订后重新submit
           ↓
           4. 所有approve方均通过 → CQO 出具最终放行指令
           ↓
           5. ANLT execute输出 → 写入audit日志(含所有approve方意见)
           ↓
           6. 存档:approve包保留 7 年

8.4 G3 approve包格式

{
  "gate_id": "<UUID>",
  "gate_level": "G3",
  "trigger_condition": "<G3-A 至 G3-G>",
  "anlt_exec_id": "EXEC-003",
  "report_summary": "<report摘要(500字内)>",
  "sensitivity": "<public|internal|confidential|restricted>",
  "cross_border_flag": "<boolean>",
  "pii_summary": {
    "pii_fields_detected": ["<字段列表>"],
    "desensitization_applied": "<boolean>",
    "desensitization_rate": "<0.0-1.0>"
  },
  "risk_assessment": {
    "fair_prelim": "<P0|P1|P2|P3>",
    "key_risks": ["<risk描述>"]
  },
  "approvals": [
    {
      "approver": "<role>",
      "decision": "<approved|conditional|rejected>",
      "comments": "<approve意见>",
      "timestamp": "<ISO-8601>"
    }
  ],
  "release_status": "<released|rejected|pending>",
  "release_timestamp": "<ISO-8601,释放时填写>"
}

8.5 G3 门禁 SLA

approvephaseSLA超时处置
ANLT → approve方notifyreal-time(<1min)自动upgrade至 CEO
approve方respond≤ 48h视为"无异议通过",CQO 可代理approve
全部approve完成 → 释放≤ 72h连续 2 次超时 → CEO 干预

8.6 G3 audit要求

所有 G3 门禁event必须写入audit日志:

{
  "agent": "ai-company-anlt",
  "exec_id": "EXEC-003",
  "gate_event": "G3_triggered | G3_approved | G3_rejected | G3_released",
  "gate_id": "<UUID>",
  "trigger_condition": "<G3-A 至 G3-G>",
  "sla_met": "<boolean>",
  "approvers": ["<全部approve方>"],
  "release_timestamp": "<ISO-8601>"
}

security考虑

CISO STRIDE assess

威胁结果defend措施
SpoofingPass仅调用白名单域名 API
TamperingPass不修改源data,只读操作
RepudiationPass所有查询record完整audit
Info DisclosurePassPII 自动脱敏,敏感data不落盘
Denial of ServicePass查询超时 60s,超限circuit breaker
ElevationPass不请求 exec,最小permissionprinciple

prohibit行为

  • prohibit直接访问原始data库(必须通过 API)
  • prohibit导出未经脱敏的原始data
  • prohibit缓存原始data(只保留聚合结果)
  • prohibit跨区域data传输(无 CLO authorize)

audit要求

必须record的audit日志

{
  "agent": "ai-company-anlt",
  "exec-id": "EXEC-003",
  "timestamp": "<ISO-8601>",
  "action": "data-collection | report-generation | insight-extraction",
  "data-sources": ["<sources-accessed>"],
  "data-volume": {"records": "<number>", "pii-detected": "<boolean>"},
  "cross-border-flag": "<boolean>",
  "compliance-status": "<pass|conditional|fail>",
  "quality-gate": "G3",
  "owner": "CFO"
}

与 C-Suite 的接口

方向通道内容
HQ → ANLTsessions_sendanalysis-type + data-sources + date-range
ANLT → CFOsessions_sendreport + insights + compliance-status
ANLT → CLOsessions_sendcross-border-flag triggered

常见错误

错误码原因handle方式
ANLT_001data源不可用返回错误,列出可用data源
ANLT_002accuracy低于threshold阻断,提示verifydata源
ANLT_003PII detect阻断,脱敏后重试
ANLT_004跨境datarisk阻断,等待 CLO confirm

| 1.0.0 | 2026-04-15 | 重建版本:standard化+模块化+通用化 L3,完整 ClawHub Schema v1.0 | | 1.1.0 | 2026-04-19 | P1-11:新增 ANLT→CRO data流接口(第6章),Definition CRO riskassess所需data字段standard | | 1.2.0 | 2026-04-19 | P2-14:quarterlycompliancereviewprocess(第102章);P2-15:G3门禁approveprocess(第103章) |

Comments

Loading comments...