Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Macro Monitor

v1.0.2

每日宏观数据监控和推送。自动浏览免费数据源(Trading Economics、FRED、国家统计局、央行官网、财联社等),整理整合过去24小时发布的宏观数据和政策信息,并推送给用户。通过 cron 每天晚上10点自动触发。

4· 2.4k·27 current·27 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for hmzo/macro-monitor.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Macro Monitor" (hmzo/macro-monitor) from ClawHub.
Skill page: https://clawhub.ai/hmzo/macro-monitor
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install macro-monitor

ClawHub CLI

Package manager switcher

npx clawhub@latest install macro-monitor
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (daily macro data monitoring and push) matches the instructions (use browser to visit listed public data sites, compile past-24h items, push results). No unrelated env vars, binaries, or installs are requested.
Instruction Scope
Instructions are narrowly scoped to browsing public macro data sites, cross-checking explanations, compiling a report, and pushing it. Two practical issues: (1) the SKILL.md uses an absolute path /home/hmzo/.openclaw/... to read references/indicators.md (this is likely intended to read the skill's local reference file but is user-specific and may fail or accidentally reference a different location on other hosts); (2) the 'push' step references a message tool but the example invocation is empty/missing, so it's unclear what target or channel will receive the report. These are implementation/robustness issues rather than malicious scope creep.
Install Mechanism
No install spec and no code files — instruction-only skill. This is the lowest-risk install mechanism (nothing is downloaded or written by an installer).
Credentials
The skill declares no environment variables, credentials, or config paths beyond reading its own references file. It only uses network access to public websites, which is consistent with its purpose.
Persistence & Privilege
always is false and the skill is user-invocable; autonomous invocation is allowed (default) but not combined with other red flags. Cron config is provided in the instructions, which is appropriate for a scheduled reporting skill.
Assessment
This skill appears to do what it claims (visit public macro data sites, compile a daily summary, and push it). Before enabling it automatically: 1) verify the 'read' path maps to the skill's local references file in your environment (the absolute path /home/hmzo/... may be incorrect or could point to an unexpected location); 2) confirm where the message tool will send reports (the example push invocation is missing) and that the destination is appropriate/authorized; 3) confirm you are comfortable with the agent's browser tool having network access to fetch and render third‑party pages (pages may contain dynamic scripts or require rate-limiting or respect robots.txt); 4) test a manual run to ensure the skill doesn't try to access other filesystem paths or prompt for credentials; and 5) ensure this scraping behavior complies with the terms of the target sites. If those checks are acceptable, the skill is coherent and proportionate to its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk970rwjmr8qkgyd66bw517c45h812amw
2.4kdownloads
4stars
3versions
Updated 1h ago
v1.0.2
MIT-0

宏观数据监控技能

工作流程

当此技能被触发时(通常通过 cron 每天晚上10点),执行以下步骤:

1. 启动浏览器

使用 browser 工具启动浏览器控制:

browser action=start profile=openclaw

2. 读取科普知识库

必须先读取 references/indicators.md 文件,获取常见指标的科普解释:

read path=/home/hmzo/.openclaw/workspace/skills/macro-monitor/references/indicators.md

3. 采集数据

按优先级访问以下数据源,收集过去24小时发布的宏观数据和政策信息:

国际数据:

国内数据:

新闻资讯:

4. 整理整合

将采集到的数据按以下结构整理:

【过去24小时宏观数据】📊

🌍 国际数据
- [数据名称] [发布值] [预期值] [前值] [影响说明]
  💡 [小白向科普解释说明 - 每个指标都必须添加]

🇨🇳 国内数据
- [数据名称] [发布值] [预期值] [前值] [影响说明]
  💡 [小白向科普解释说明 - 每个指标都必须添加]

📜 政策动态
- [政策标题] - [简要说明]

📰 重要资讯
- [新闻标题] - [简要说明]

科普解释规则(强制执行):

  1. 每个指标都必须添加科普解释,没有例外

  2. 科普解释来源优先级:

    • 优先:从 references/indicators.md 中查找现成解释
    • 其次:如果找不到,执行"未知指标处理"流程
  3. 科普解释格式要求:

    💡 [指标名]:[一句话定义]
       - 为什么重要:[简短说明]
       - 怎么看:[正常范围/关键阈值]
    
  4. 对于重要数据变化,添加额外解读:

    • 超预期:为什么超预期?对市场有什么影响?
    • 低于预期:反映了什么问题?政策可能如何应对?

未知指标处理流程

当遇到 references/indicators.md 中没有的指标时:

  1. 多源搜索验证 使用 browser 工具搜索该指标,访问多个来源:

    • 搜索1:"[指标名] 是什么 意思"
    • 搜索2:"[指标名] 经济指标 解释"
    • 搜索3:"[指标名] investing.com" 或 "[指标名] trading economics"
  2. 交叉验证

    • 对比多个来源的解释,确保准确性
    • 优先选择权威来源(央行官网、统计局、知名财经媒体)
    • 避免单一来源的片面解释
  3. 整理科普内容 将搜索结果整理成通俗易懂的格式:

    💡 [指标名]:[一句话定义]
       - 为什么重要:[简短说明]
       - 怎么看:[正常范围/关键阈值]
    
  4. 可选:更新知识库 如果该指标是常见指标,考虑将解释添加到 references/indicators.md 中,避免重复搜索

5. 推送消息

使用 message 工具将整理好的报告推送给用户:

数据源快速访问

Trading Economics 经济日历

国家统计局

  • URL: http://www.stats.gov.cn/
  • 关注:最新数据发布栏目
  • 重点指标:GDP、CPI、PPI、PMI、工业增加值、社会消费品零售

央行官网

  • URL: http://www.pbc.gov.cn/
  • 关注:新闻发布、政策解读
  • 重点:LPR利率、MLF操作、公开市场操作、货币政策报告

注意事项

  1. 时间过滤:采集过去24小时(GMT+8)发布的数据和新闻
  2. 科普解释强制:每个指标都必须添加科普解释,没有例外
  3. 重要性排序:高重要性数据优先展示
  4. 简洁明了:每个条目不超过2行,重点突出数值变化
  5. 数据验证:对比实际值与预期值,标注超预期/不及预期
  6. 异常处理:如果某个数据源无法访问,跳过并记录,不影响其他数据源

Cron 配置

此技能通过以下 cron job 调度:

{
  "name": "macro-monitor-daily",
  "schedule": {
    "kind": "cron",
    "expr": "0 22 * * *",
    "tz": "Asia/Singapore"
  },
  "payload": {
    "kind": "agentTurn",
    "message": "执行宏观数据监控,浏览免费数据源,整理过去24小时发布的宏观数据和政策信息并推送"
  },
  "sessionTarget": "isolated",
  "enabled": true
}

手动触发

如需手动触发数据采集,发送消息:

执行宏观数据监控,浏览免费数据源,整理过去24小时发布的宏观数据和政策信息并推送

Comments

Loading comments...