Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Crane Hook Annotation

v1.0.0

Detect and tightly annotate tower-crane hook outlines in similar construction-site monitoring images. Use when Codex needs to batch-process `.png`, `.jpg`, o...

0· 99·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for genlk/crane-hook-annotation.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Crane Hook Annotation" (genlk/crane-hook-annotation) from ClawHub.
Skill page: https://clawhub.ai/genlk/crane-hook-annotation
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install crane-hook-annotation

ClawHub CLI

Package manager switcher

npx clawhub@latest install crane-hook-annotation
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The name, description, profile JSON, and tuning docs all align with a crane-hook annotation tool — that part is coherent. However, the SKILL.md requires running scripts/annotate-crane-hooks.ps1 (and the Quick Start references a .\skills\crane-hook-annotation\scripts\annotate-crane-hooks.ps1 path) but no such script is present in the file manifest. A skill that claims to perform local image processing but omits its core executable is an integrity/incompleteness problem.
!
Instruction Scope
The instructions are narrowly scoped to local image annotation and profile tuning (no unexpected exfiltration endpoints or unrelated system access). However, they direct the user to run a PowerShell script with -ExecutionPolicy Bypass — a flag that disables script execution restrictions and should only be used for trusted scripts. Because the referenced script is absent, the instructions currently ask the user to obtain/execute code that isn't supplied, which increases risk.
Install Mechanism
There is no install spec and no binaries requested — the skill is instruction-only and doesn't automatically write or download code. That lowers the packaging-installation risk. The risk instead arises from the missing script the instructions expect.
Credentials
The skill requests no environment variables, credentials, or config paths — this is proportionate for an offline image-annotation tool. There is no indication of unrelated credential access.
Persistence & Privilege
always is false and the skill does not request persistent system privileges. agents/openai.yaml sets allow_implicit_invocation: true, so the agent could implicitly invoke this skill when eligible; that is a normal setting but worth noting if the skill later gains network/exfiltration behavior. By itself this is not a strong red flag.
What to consider before installing
Do not run unknown PowerShell scripts you can't inspect. Before installing or using this skill: (1) confirm the missing script (scripts/annotate-crane-hooks.ps1) is provided by a trusted source and inspect its contents for network calls, data uploads, or commands that modify the system; (2) avoid using -ExecutionPolicy Bypass unless you fully trust the script; (3) request the author/source homepage or repository to verify provenance — the skill currently lists source as unknown; (4) if you must test, run the script only on non-sensitive sample images in an isolated environment (or sandbox/VM) and search the script for any outbound network operations or calls to curl/powershell Invoke-WebRequest/Invoke-RestMethod; (5) prefer packages that include their executables or are published by a verifiable maintainer. The core coherence issue (missing script) should be resolved before trusting this skill.

Like a lobster shell, security has layers — review code before you run it.

construction-monitoringvk973rrvn5tr54aevcztssb1e8183hjmximage-annotationvk973rrvn5tr54aevcztssb1e8183hjmxlatestvk973rrvn5tr54aevcztssb1e8183hjmx
99downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Crane Hook Annotation

Use this skill when the user has many similar site-monitoring images and wants the crane hook outlined with a strict polygon rather than a loose box.

Workflow

  1. Confirm the images are from a similar viewpoint.
  2. Run annotate-crane-hooks.ps1 on one sample image first.
  3. Inspect the annotated output and the manifest JSON.
  4. If the hook is consistently shifted, edit default-monitoring-profile.json.
  5. Re-run the same script on the full directory once the sample looks right.

Quick Start

Run a sample image:

powershell -ExecutionPolicy Bypass -File .\skills\crane-hook-annotation\scripts\annotate-crane-hooks.ps1 `
  -InputPath .\sample-image.jpg `
  -OutputDir .\hook-batch-output `
  -WriteDebugRoi

Run a directory:

powershell -ExecutionPolicy Bypass -File .\skills\crane-hook-annotation\scripts\annotate-crane-hooks.ps1 `
  -InputPath .\incoming-images `
  -OutputDir .\hook-batch-output `
  -Recurse

Outputs

  • annotated/: annotated images with the strict hook polygon and label
  • debug-roi/: optional ROI crops for inspection
  • manifest.json: one record per image with component bbox, polygon points, and status

Tuning

Read profile-tuning.md when:

  • the hook is detected but the outline is systematically shifted
  • the hook search area is too narrow or too wide
  • the user changes camera angle or image resolution
  • a different site needs its own profile

Adjust these fields first:

  • search_roi_norm
  • bright_threshold
  • filters
  • reference_component_bbox_norm
  • polygon_points_in_bbox_norm

Notes

  • The current default profile is calibrated from the accepted hook outline in this workspace.
  • The script assumes a bright metal hook against a darker construction background.
  • Batch execution is safest when images come from the same or a very similar camera setup.

Comments

Loading comments...