Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Protein Struct Viz
v1.0.0Generate PyMOL scripts to highlight specific protein residues in PDB structures. Use this skill when the user needs to visualize specific amino acid residues...
⭐ 0· 38·0 current·0 all-time
byAIpoch@aipoch-ai
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description match the actual artifacts: the repository includes a Python script that generates PyMOL (.pml) scripts and the SKILL.md documents expected parameters. It requires PyMOL to be installed separately (declared) and no unrelated credentials or binaries are requested.
Instruction Scope
The generator embeds user-supplied residue specs and output filename directly into the .pml text with no sanitization. A malicious or malformed residue string can inject arbitrary PyMOL commands into the generated script; the output filename is used directly and can contain path traversal (e.g., '../') leading to writing files outside the workspace. The script also emits 'fetch <pdb_id>' commands — when run in PyMOL those will perform network downloads. SKILL.md lists input validation in a checklist but the implementation does not enforce it.
Install Mechanism
No install spec or remote downloads are present; this is essentially an instruction + included script. Nothing in the manifest pulls external archives or installs packages during install time.
Credentials
No environment variables or credentials are requested, which is proportionate for the stated functionality. There are no unexpected secret accesses.
Persistence & Privilege
always:false and no special persistence or skill-wide config modifications. The skill does write files to disk (output .pml) but does not request elevated platform privileges.
What to consider before installing
This skill appears to do what it says (generate PyMOL scripts), but exercise caution before installing or running generated scripts.
What to consider before using:
- Do NOT run .pml files produced from untrusted inputs without inspection. The generator inserts user-provided residue specs directly into the script, so malicious text could inject PyMOL commands.
- Restrict the output path: the tool writes the provided filename verbatim. Avoid running it with untrusted output paths and ensure the filename is normalized and confined to a safe workspace (prevent '../' escapes).
- Validate inputs: only allow residue specs that match a safe pattern (example regex idea: ^(?:(?:[A-Za-z]|\*)?:)?\d{1,5}(?::[A-Z]{3})?$ with explicit handling of wildcards) and disallow characters like semicolons, newline, backticks, or other shell/command delimiters. Sanitize color names and style choices against allowed lists.
- Review generated .pml before executing in PyMOL, and avoid executing scripts from unknown sources. Look for unexpected commands (e.g., system calls or file manipulation commands) inserted into the file.
- Be aware that the generated scripts may include 'fetch <pdb_id>' which triggers network downloads when run inside PyMOL; if that is a privacy or network policy concern run PyMOL in an environment where network access is controlled.
- If you plan to adopt this skill into automated workflows, either add input sanitization and path normalization to scripts/main.py or run the generator in a sandbox/VM and only transfer inspected outputs into production systems.
If you want, I can provide a safe-sanitizing wrapper for this script (validate residue specs, restrict output path to workspace, and whitelist style/color inputs) or specific regex patterns and filename normalization code to reduce these risks.Like a lobster shell, security has layers — review code before you run it.
latestvk978kq5ahh9gz5rrs4fz33str983z1y4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
