Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
ITSM 工单自动提交
v2.1.0自动通过系统自带 chromium 浏览器和 Selenium 提交 ITSM 工单,支持头程、尾程询价、批次查询和问题反馈。
⭐ 0· 149·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (automatically submit ITSM tickets via Chromium + Selenium) aligns with the shipped scripts (start.sh, submit-itsm.py, close.sh). However SKILL.md advertises environment variables (ITSM_USERNAME, ITSM_PASSWORD, etc.) and default credentials, while the registry metadata lists no required env vars. The code uses Chromium + Selenium as claimed, so capability matches purpose, but the undocumented/default credentials and env-var mismatch are inconsistent.
Instruction Scope
Runtime instructions and scripts perform system-level operations: installing Python packages (pip install), optionally downloading get-pip.py from the network, apt-get installing chromium-browser with sudo, launching Chromium with a remote-debugging port, and reading/using local file paths for attachments (including converting Windows paths to WSL paths). These actions go beyond a pure API wrapper and may access local files and expose a CDP port that other local processes could reach. The SKILL.md also suggests providing secrets via environment variables, but the manifest does not declare them.
Install Mechanism
There is no formal install spec in the registry (instruction-only). The scripts self-install dependencies at runtime: pip installs (selenium, requests), may fetch get-pip.py from https://bootstrap.pypa.io, and may apt-get install chromium-browser. The external URLs used are standard (PyPA, apt repos) rather than unknown shorteners or personal servers. Still, runtime downloads and automatic package installation are moderate-risk behaviors and may alter the host environment.
Credentials
SKILL.md lists environment variables for credentials and data, but the registry declares none — a mismatch that should be surfaced to users. The code embeds default username/password values (500525 / Xy@123456) which could lead to accidental use of insecure defaults. The skill can access arbitrary local files (attachmentPath) and will attempt to convert Windows paths to WSL paths, implying access to user files outside the skill directory.
Persistence & Privilege
The skill is not flagged as always:true and does not request system-wide configuration changes in the manifest. It does start Chromium with remote-debugging enabled while running; this is transient to its operation and not recorded as persistent system modification by the manifest. No evidence the skill modifies other skills' configurations.
What to consider before installing
This skill appears to implement the advertised automation but performs system-level operations and contains some inconsistencies you should review before installing. Recommendations:
- Inspect submit-itsm.py fully to confirm whether it reads environment variables or uploads arbitrary files. Search for os.environ usage and any code that posts data to endpoints other than the ITSM host.
- Do not run start.sh as root indiscriminately. The script may call sudo apt-get and pip; prefer running in a disposable VM or container to limit system impact.
- Remove or replace hard-coded default credentials (500525 / Xy@123456) and supply credentials explicitly via the conversation or safe env injection. Confirm the code does not leak credentials to third parties.
- Be aware that starting Chromium with --remote-debugging-port exposes a local CDP endpoint; ensure the port is not accessible remotely on your network and close the browser after use.
- If you need to allow attachments, verify the attachment path handling and ensure no sensitive files are uploaded by default.
If you want, I can: (1) scan submit-itsm.py for env access and network calls more thoroughly, (2) point out exact lines that set defaults or contact external URLs, or (3) suggest a safer wrapper that avoids automatic installs and requires explicit user consent for installs and network downloads.Like a lobster shell, security has layers — review code before you run it.
latestvk979bcbgj899evv0a1hw3939r9834vfh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
