Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
OpenRouter Free Helper
v1.0.7监控 OpenRouter 免费模型的到期通知和新模型发现,自动每日检查并推送飞书通知
⭐ 0· 86·0 current·0 all-time
byNeo Shi@suidge
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (monitor OpenRouter free models and notify via Feishu) align with included scripts and docs. Requiring python3 and optional bb-browser is reasonable. However the skill claims to 'push Feishu notifications' yet declares no required Feishu token or webhook environment variables — notification delivery appears to rely on OpenClaw's delivery layer or the user's openclaw.json, which is not made explicit.
Instruction Scope
SKILL.md and references instruct running the local Python scripts, using bb-browser (optional), and creating a cron job. The scripts are expected to fetch pages from openrouter.ai and optionally start Chrome in remote-debugging mode. The cron-run guidance intentionally constrains agent output (one brief summary) which is coherent for cron delivery but gives the agent precise instructions to operate on local files and run the check script; that scope is appropriate for the task but should be reviewed because the job message instructs agents to run in an isolated session rooted at a user path.
Install Mechanism
No install spec is provided (instruction-only plus Python scripts). This is lower risk than arbitrary downloads. package.json lists bb-browser as an optional dependency (from npm) which is expected for the optional enhanced discovery path.
Credentials
The skill does not declare or request any environment variables or secrets, yet it advertises Feishu notifications. The code reads the user's OpenClaw config (~/.openclaw/openclaw.json) and a per-skill config/status file; those files may contain credentials or delivery configuration. The absence of explicit required credentials for notification delivery (Feishu webhook/token) is an unexplained gap that could hide implicit reliance on existing OpenClaw credentials or force the user to place secrets in openclaw.json or other local files.
Persistence & Privilege
always:false and user-invocable:true (default) — the skill does not request permanent/global presence. It does start a local Chrome instance when needed and writes/reads its own config/status files under the user's workspace, which is normal for a local monitor.
What to consider before installing
This skill appears to do what it says (scrape OpenRouter pages, detect 'Going away' notices, discover new free models), but check these before installing:
- Inspect the full check-models.py to see exactly how notifications are sent. Determine where Feishu credentials (webhook/token) are expected — the skill does not declare env vars for them and likely reads them from your existing OpenClaw configuration (openclaw.json) or expects you to configure them manually. Avoid placing secrets into files without encryption; prefer platform-managed secrets if available.
- The script can auto-start Chrome in remote-debugging mode (port 9222). That opens a local debugging port — run this only on a trusted, single-user machine or restrict access (Chrome is started with an isolated profile in /tmp, but the debug port is network-accessible on localhost). If you don't need bb-browser, skip installing it to reduce attack surface.
- Run the scripts manually in a sandbox (or inspect runtime behavior with verbose/dry-run flags) before enabling any cron/automation. Verify network destinations — the code should only access openrouter.ai (and local bb-browser adapters if used).
- Review ~/.openclaw/openclaw.json to understand what the skill will read; if that file contains tokens for other services, confirm you’re comfortable the skill will access only the needed fields.
- If you need higher assurance, request the author to document where notification credentials live (explicit env vars or secure config), or modify the code to require an explicit Feishu webhook env var rather than silently using a shared config file.
Given these ambiguities about credential handling and the Chrome debug behavior, proceed only after verifying notification implementation and local config contents.Like a lobster shell, security has layers — review code before you run it.
latestvk9792jy2s979xfb70kac700q3h84wk34
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspython3, bb-browser
