Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

IPv6地址查询 - 即刻数据

v1.0.0

IPv6地址查询。输入 IPv6 地址,实时查询国家、省份、城市、地区、运营商和 long_ip 数值。适用场景:用户说“查一下 240e:1f:1::1 是哪里的 IPv6”“这个 IPv6 属于哪个运营商”等。数据由即刻数据(jikeapi.cn)开放接口提供。

0· 18·1 current·1 all-time
byjikeapi@jikeapi-cn

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for jikeapi-cn/jike-ip-query-v6.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "IPv6地址查询 - 即刻数据" (jikeapi-cn/jike-ip-query-v6) from ClawHub.
Skill page: https://clawhub.ai/jikeapi-cn/jike-ip-query-v6
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required env vars: JIKE_IP_QUERY_V6_KEY
Required binaries: python3
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install jike-ip-query-v6

ClawHub CLI

Package manager switcher

npx clawhub@latest install jike-ip-query-v6
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name, description, required binary (python3), and the included script all align with an IPv6 geolocation lookup skill that calls jikeapi.cn. The declared primary credential (JIKE_IP_QUERY_V6_KEY) is appropriate for the described API usage.
Instruction Scope
SKILL.md instructs the agent to extract an IPv6 and run the included script, which is consistent. The script also reads a local .env file in its directory (to find keys) and accepts a --key override; these behaviors are documented in the script but not fully reflected in the metadata. The script does not read broader system files or unrelated paths.
Install Mechanism
No install spec; this is an instruction-only skill with an included Python script. Nothing is downloaded or written to arbitrary paths by an installer. Risk from install mechanism is low.
!
Credentials
Metadata declares JIKE_IP_QUERY_V6_KEY but the script also accepts JIKE_APPKEY and an override JIKE_API_BASE_URL. That means the skill can source the key from an alternate env var or .env file, and the endpoint can be redirected via JIKE_API_BASE_URL. Those extra env hooks are reasonable for local testing, but they are not declared in the skill metadata and could be abused to redirect requests (and the appkey) to an unexpected endpoint.
Persistence & Privilege
Skill does not request always:true, does not modify other skills or system-wide settings. Autonomous invocation is allowed (platform default) but nothing here elevates privilege beyond running the script when invoked.
What to consider before installing
This skill appears to implement what it claims: it runs a Python script that calls jikeapi.cn to look up IPv6 geolocation and needs an AppKey. Before installing, consider: (1) trust the provider (jikeapi.cn) since your AppKey will be sent to their API; (2) the script will also look for JIKE_APPKEY and a local .env in the script directory and respects JIKE_API_BASE_URL if set — verify you do not have those env vars set to untrusted values, because that could redirect requests (and leak your key) to another host; (3) avoid using sensitive/privileged API keys — prefer a limited-scope key for this purpose; (4) you can inspect the included scripts before running to confirm behavior. If you need the metadata to be strict, ask the publisher to declare the additional env variables (JIKE_APPKEY, JIKE_API_BASE_URL) or remove the override capability.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🌐 Clawdis
Binspython3
EnvJIKE_IP_QUERY_V6_KEY
Primary envJIKE_IP_QUERY_V6_KEY
ipvk979rj143bj3md2qvhv34x31hd85pghkjikeapivk979rj143bj3md2qvhv34x31hd85pghklatestvk979rj143bj3md2qvhv34x31hd85pghk
18downloads
0stars
1versions
Updated 4h ago
v1.0.0
MIT-0

IPv6地址查询 - 即刻数据

数据由 即刻数据 提供,帮助 AI 客户端快速接入可靠数据服务。

输入 IPv6 地址,查询:国家、省份、城市、地区、运营商、Long 数值

前置配置

export JIKE_IP_QUERY_V6_KEY=你的AppKey
# 或使用通用 Key
export JIKE_APPKEY=你的AppKey

使用方法

python3 scripts/ip_query_v6.py 240e:1f:1::1
python3 scripts/ip_query_v6.py 240e:1f:1::1 --json

直接调用 API:

GET https://api.jikeapi.cn/v1/ip/query/v6?ip=240e:1f:1::1&appkey=YOUR_APPKEY

AI 使用步骤

  1. 从用户消息中提取 IPv6 地址。
  2. 校验格式,IPv4 不调用本 Skill。
  3. 执行 python3 scripts/ip_query_v6.py <IPv6地址>
  4. 返回国家、省份、城市、地区、运营商等信息。

返回字段

字段含义
ipIPv6 地址
long_ipLong 数值
country国家
province省份
city城市
area地区
isp运营商

脚本位置

scripts/ip_query_v6.py

Comments

Loading comments...