Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Graphviz
v1.0.0Generate SVG images from Graphviz DOT graphs using WebAssembly. Uses the graphviz_component.wasm running in the openclaw-wasm-sandbox plugin. No graphviz sys...
⭐ 0· 84·1 current·1 all-time
by@guyoung
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name and description match the instructions: the skill uses the openclaw-wasm-sandbox plugin to run a graphviz_component.wasm and produce SVG from DOT. Requesting the plugin and a WASM file is proportionate to the stated purpose.
Instruction Scope
SKILL.md instructs downloading a WASM file to ~/.openclaw/skills/graphviz/files/graphviz_component.wasm (using a wasm-sandbox-download tool) and running it with wasm-sandbox-run. The doc also states 'runs in sandbox with no implicit file/network access' which contradicts the explicit download instruction. The instructions do not require reading unrelated files or any credentials, but they do implicitly require writing to the user's home directory and performing a network fetch.
Install Mechanism
There is no install spec, but the runtime instructions direct fetching a binary from https://raw.githubusercontent.com/... — a raw GitHub URL. Downloading and executing third-party WASM is a supply-chain risk, especially since no checksum/signature or release provenance is provided and the skill contains no bundled code to inspect.
Credentials
The skill requests no environment variables, no credentials, and no system binaries. The only required resource is the openclaw-wasm-sandbox plugin and the user-local path shown; these are reasonable for the stated function.
Persistence & Privilege
always is false and the skill does not request elevated or persistent platform privileges. It does require writing a file under the user's OpenClaw skills folder, which is normal for a skill that needs a WASM artifact.
What to consider before installing
This skill appears to do what it claims (render DOT to SVG via a WASM component), but it instructs the agent to download a WebAssembly binary from a raw GitHub URL and run it without any integrity checks. That is the main risk: malicious or compromised WASM could execute unwanted behavior inside the sandbox or exploit sandbox weaknesses. Before installing or running this skill, consider asking the author for: (1) a verified release URL or signed checksum (SHA256) for graphviz_component.wasm, (2) the source repository/homepage and maintainer identity, or (3) bundling the WASM with the skill or using a well-known release host. Also confirm what guarantees the openclaw-wasm-sandbox provides (network/file access restrictions, syscall limitations). If you cannot verify the WASM artifact, avoid running it in contexts with sensitive data or require user confirmation before any automatic download/execute.Like a lobster shell, security has layers — review code before you run it.
latestvk97anqt6pmm8qrb9tktgxqzhb583zy5w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
