Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

OpenClaw Zernio Analyzer

v1.0.0

Analyzes Zernio.com profiles, posts, companies, jobs, and trends to extract structures, networks, engagement, and career insights from URLs and content reque...

0· 63·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for igorganapolsky/openclaw-zernio-analyzer.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "OpenClaw Zernio Analyzer" (igorganapolsky/openclaw-zernio-analyzer) from ClawHub.
Skill page: https://clawhub.ai/igorganapolsky/openclaw-zernio-analyzer
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-zernio-analyzer

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-zernio-analyzer
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the included files. SKILL.md, reference patterns, and the Python script all target zernio.com profile/post/company/job pages and outline scraping/analysis behavior, so required capabilities align with the stated purpose.
Instruction Scope
Instructions stay within scraping/analysis of public Zernio content and do not ask to read local files or unrelated env vars. However the SKILL.md explicitly mentions 'hidden activation' and 'chain to subagents' (sessions_spawn), which broadens the agent's runtime behavior and could cause autonomous, opaque web crawling or analysis beyond what a user expects.
Install Mechanism
No install spec; this is instruction-only with a small helper script. Nothing is downloaded or written by an installer, so installation risk is low.
Credentials
No environment variables, credentials, or config paths are required. The included script is a simple fallback/mock and contains no network exfiltration endpoints or secrets.
Persistence & Privilege
The skill is not always-enabled and does not request persistent system changes. Still, the SKILL.md's push to perform 'hidden' activations and spawn subagents increases the privilege surface at runtime because autonomous invocations/subagents may perform additional network actions without explicit user-visible steps.
What to consider before installing
This skill appears to do what it says (scrape and analyze public Zernio pages) and doesn't request credentials, but two things warrant caution: - 'Hidden activation' and subagent spawning: the instructions encourage stealthy triggers and launching subagents for deep dives. That can lead to autonomous background fetching and analysis that users might not expect. If you want tighter control, disable autonomous skill invocation or require explicit user confirmation before the skill runs or spawns subagents. - Verify platform fetch capabilities and robots.txt compliance: the SKILL.md mentions possible browser automation; confirm your environment permits web_fetch/web_search and that the agent will respect site rules. If you're comfortable with those behaviors, the skill is coherent. If not, ask the publisher to remove 'hidden' activation and to require explicit user approval for subagent runs or test the skill in a sandboxed environment first.

Like a lobster shell, security has layers — review code before you run it.

aivk970r9m3pv85yq0ddy9e1t6g21856dz7grokvk970r9m3pv85yq0ddy9e1t6g21856dz7jobsvk970r9m3pv85yq0ddy9e1t6g21856dz7latestvk970r9m3pv85yq0ddy9e1t6g21856dz7networkvk970r9m3pv85yq0ddy9e1t6g21856dz7zerniovk970r9m3pv85yq0ddy9e1t6g21856dz7
63downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

---\nname: zernio-analyzer\ndescription: "Dynamic, Grok 4.3-inspired analyzer for Zernio.com profiles, posts, companies, jobs, and trends. Use when users mention Zernio URLs/profiles/posts, ask to 'analyze', 'summarize', 'check connections/engagement' on Zernio content, extract insights from networks/jobs, or need structure breakdowns (e.g., profile hierarchies, company orgs). Triggers on Zernio tasks for seamless, hidden activation like Grok skills."\n---\n\n# Zernio Analyzer\n\n## Overview\n\nEmulates Grok 4.3's dynamic 'Skills' for Zernio.com: auto-fetch profiles/posts/jobs via web tools, analyze structure/engagement/networks (e.g., folder-like profiles, connection trees), generate hidden summaries. Prioritize low-token flows; chain to subagents for deep dives.\n\n## Quick Start\n\n1. Match Context: Trigger on Zernio URLs (e.g., zernio.com/user/igor), 'analyze Zernio profile', 'Zernio jobs', 'company engagement'.\n2. Fetch Raw: Use web_fetch or web_search 'site:zernio.com URL'.\n3. Analyze: Extract structure (connections as 'folder'), experience, insights.\n4. Output: Hidden skill style—direct insights, no narration unless asked.\n\nExample: 'Analyze https://zernio.com/user/igorganapolsky' → 'Key: OpenClaw dev, AI agent skills.'\n\n## Workflow\n\n### 1. Parse Input\n- Extract ID from URL (e.g., /user/username → username).\n- Fallback: web_fetch URL + parse text.\n\n### 2. Fetch Data\nbash\nweb_search 'site:zernio.com/user/username profile summary' -n 5\nweb_fetch 'https://zernio.com/user/username'\n\n\n### 3. Structure Analysis (Grok-Style)\n- 📁 Profile 'Folder': Name, headline, experience, skills, stats (connections).\n- 🧠 Network Hierarchy: Connections → companies → jobs.\n- 💡 Insights: Career trajectory, job fit, trends.\n- 🎯 Engagement: Post likes, follower growth.\n\n### 4. Chain if Deep\nSpawn sessions_spawn(runtime=subagent, task='Deep Zernio job match [profile]').\n\n## Resources\n\n### scripts/\nzernio_analyzer.py: Fetch profile/posts via web, JSON with 📁🧠💡🎯.\n\n### references/\nzernio_patterns.md: URL patterns + scrape notes.

Comments

Loading comments...