Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

figma-pixel

v1.0.11

Compare a webpage or UI layout against a Figma design, then guide the agent to build or fix the implementation. Scripts handle capture, comparison, and repor...

0· 132·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Requires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (compare a page to Figma and guide fixes) align with what the package requires and does: it reads a Figma URL, uses FIGMA_TOKEN to call the official Figma REST API, exports reference images, renders pages with Playwright, runs pixelmatch/OpenCV diffing, and emits reports. Required env (FIGMA_TOKEN) and filesystem access for run artifacts are appropriate for this functionality.
Instruction Scope
SKILL.md and scripts stay within the stated scope: they parse Figma URLs, fetch Figma API data, export images, render the implementation, compare, and produce reports. The agent is expected to write or edit HTML/CSS in the implementation project to fix mismatches — this is permitted by the skill but means the agent must have write access to the project directory. The skill also creates run directories (figma-pixel-runs/...) and writes artifacts there; verify you are comfortable with that location and content being created.
Install Mechanism
There is no runtime installer embedded in the skill. The package expects host-managed Node modules and a browser executable (Playwright, pixelmatch, pngjs, @techstark/opencv-js, Chromium). The SKILL.md and README instruct the user to install these dependencies manually—this is transparent and proportionate. No external arbitrary download URLs or extract/install steps are present in the skill itself.
Credentials
Only FIGMA_TOKEN is declared as a required env var, which is necessary to call the official Figma API. The code reads optional overrides (PLAYWRIGHT_MODULE_PATH, PNGJS_MODULE_PATH, PIXELMATCH_MODULE_PATH, CHROMIUM_PATH) for module resolution and browser path — these are legitimate runtime overrides. The skill writes run artifacts to disk but does not persist FIGMA_TOKEN into artifacts or logs in the codebase.
Persistence & Privilege
always is false and the skill does not request permanent platform-wide privileges. It only writes its own run artifacts under figma-pixel-runs/<project>/<run-id>/ and does not modify other skills or system-wide agent configs. Autonomous invocation is allowed (platform default) but not flagged by itself.
Assessment
This skill appears coherent and implements what it claims. Before installing or running it: 1) Provide a scoped Figma personal access token (FIGMA_TOKEN) and consider using a token with the least privileges you need and rotate/revoke it if concerned. 2) Run the skill in a controlled environment (container or sandbox) because it will launch Playwright/Chromium and write run artifacts to the current working directory (figma-pixel-runs/...). 3) Manually install and verify the required host dependencies (playwright, pixelmatch, pngjs, @techstark/opencv-js, and a Chromium executable) per README; the skill will error rather than auto-install. 4) Be aware the agent is expected to edit project files to apply visual fixes — only allow that if you trust the agent prompt/behavior. 5) Inspect the run artifacts (reference image, captured screenshot, diff, report) after a run to ensure no sensitive data was exposed; if you find anything unexpected, revoke the Figma token. 6) If you need higher assurance, review the included scripts (they are readable JS) and run them locally with a test Figma token and non-production project first.
lib/figma-api.cjs:42
Environment variable access combined with network send.
lib/figma-export.cjs:46
Environment variable access combined with network send.
!
lib/figma-cache.cjs:21
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cn5tpadn4dmeq8x8y0qx49984vb7y

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📐 Clawdis
EnvFIGMA_TOKEN

Comments