Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Pet Restricted Area Alert Skill | 宠物禁区预警技能

v1.0.0

Monitors restricted area intrusions, climbing on dining tables, and rummaging through trash cans, and issues real-time alerts, suitable for home pet monitori...

0· 56·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for smyx-sunjinhui/smyx-pet-restricted-area-warning-analysis.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Pet Restricted Area Alert Skill | 宠物禁区预警技能" (smyx-sunjinhui/smyx-pet-restricted-area-warning-analysis) from ClawHub.
Skill page: https://clawhub.ai/smyx-sunjinhui/smyx-pet-restricted-area-warning-analysis
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install smyx-pet-restricted-area-warning-analysis

ClawHub CLI

Package manager switcher

npx clawhub@latest install smyx-pet-restricted-area-warning-analysis
Security Scan
Capability signals
Requires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (pet restricted-area monitoring) matches the code and instructions: scripts upload or reference a video and call a remote analysis API, then format/report results. However the package includes a broad common library (skills/smyx_common) with local DB/DAO code and many dependencies that are heavier than strictly necessary for a simple client that posts a file to an API. That extra surface is explainable if this is part of a product suite, but it is broader than the single-purpose description.
!
Instruction Scope
SKILL.md explicitly forbids reading local memory files (memory/*.md, LanceDB) and mandates obtaining an open-id via config files or user-supplied value. The code does read config YAMLs (skills/smyx_common/scripts/config.yaml and the workspace config) and can also pick up environment variables (OPENCLAW_SENDER_OPEN_ID, OPENCLAW_SENDER_USERNAME, FEISHU_OPEN_ID) via ConstantEnum.init — these env reads are not declared in the skill metadata. The skill also auto-saves uploaded attachments into an attachments directory and will send video files (or their URLs) to remote API endpoints; sending user video off-host is expected for a cloud analysis skill but is a significant privacy action and is clearly called for in SKILL.md. The mismatch: relying on undeclared env vars/config files and persisting uploads locally are behaviors users should be explicitly warned about.
Install Mechanism
There is no install spec (instruction-only style), so nothing is downloaded or executed at install time beyond the provided code. This limits supply-chain risk from install-time fetches. The repository does contain requirements.txt in subpackages, but no automated installer is declared in the skill metadata.
!
Credentials
Declared requirements list no environment variables, but the code reads and uses several environment/config sources: OPENCLAW_SENDER_OPEN_ID, OPENCLAW_SENDER_USERNAME, FEISHU_OPEN_ID and OPENCLAW_WORKSPACE (used by DAO to build a data path). The SKILL.md mandates retrieving an open-id from skill config files or workspace config — that requires reading local files. Because no env/config requirements are declared in the metadata, these accesses are surprising. Also the skill will upload raw video files (potentially sensitive) to the remote API; that is necessary for cloud analysis but should be clearly documented and justified to the user.
!
Persistence & Privilege
The codebase includes a local SQLite DAO and utilities that create files under a workspace/data path (using OPENCLAW_WORKSPACE) and the skill promises to 'automatically save' uploaded attachments to an attachments directory. That means the skill persists user videos and may create/modify local DB files. The skill is not marked always:true, nor does it modify other skills' configs, but local persistence is broader than what a minimal analysis client would require and raises privacy concerns relative to the SKILL.md 'no local memory' rule (which forbids reading memory/*.md but does not forbid creating a local DB or attachments).
What to consider before installing
This skill appears to implement the advertised pet-area video analysis and will send videos (or video URLs) to a remote API and produce structured reports. Before installing or running it, consider: 1) Privacy: videos you upload will be transmitted off-host to the configured API host (config YAML / ApiEnum base URLs). If you don't trust that remote service, do not upload sensitive footage. 2) Local persistence: the skill will save uploaded attachments to the skill directory and the common library can create a local SQLite DB under the workspace/data path — check and clean those directories if you have privacy concerns. 3) Undeclared env/config access: the code reads OPENCLAW_SENDER_OPEN_ID, OPENCLAW_SENDER_USERNAME, FEISHU_OPEN_ID and OPENCLAW_WORKSPACE and reads config YAML files in skills/smyx_common; these are not listed as required in the metadata. 4) Verify endpoints and provenance: the repo's configs reference lifeemergence/open API hosts — confirm the service owner and hosting domain before sending data. 5) If you need stricter guarantees: run the skill in an isolated environment, inspect skills/smyx_common/scripts/util.py (RequestUtil) to confirm exactly which endpoints and headers are used, and avoid providing an open-id or API key until you verify where data goes. If you want, I can: (a) list the exact env vars and files the code reads, (b) extract the API base URLs used at runtime from the config files, or (c) scan the util.RequestUtil implementation for any hardcoded or opaque network/exfiltration logic.
!
skills/smyx_common/scripts/config-dev.yaml:2
Install source points to URL shortener or raw IP.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk979gtep57aq8rxmka88gdvgpd851x38
56downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

Pet Restricted Area Alert Skill | 宠物禁区预警技能

Based on advanced computer vision and behavior recognition algorithms, this feature conducts intelligent monitoring of specific areas within the home environment. The system supports user-defined electronic fences and triggers an early warning mechanism immediately upon detecting a pet entering restricted zones such as kitchens or bedrooms. Furthermore, the algorithm has been specifically trained to identify particular违规 behaviors like climbing onto dining tables or rummaging through trash cans, capable of precisely recognizing these actions while filtering out environmental interference such as human movement. Once an abnormal behavior is confirmed, the system pushes real-time alarm notifications and on-site snapshots to the user's terminal, helping pet owners promptly curb bad habits and effectively maintain the cleanliness and safety of the home environment.

本功能基于先进的计算机视觉与行为识别算法,能够对家庭环境中的特定区域进行智能化监控。系统支持用户自定义设置电子围栏,当检测到宠物闯入厨房、卧室等禁止区域时,即刻触发预警机制。同时,算法针对宠物攀爬餐桌、翻找垃圾桶等特定违规行为进行了专项训练,能够精准识别并过滤人员走动等环境干扰。一旦确认异常行为,系统将实时向用户终端推送报警信息及现场快照,帮助宠物主人及时制止不良习惯,有效维护家庭环境的整洁与安全

⚠️ 强制记忆规则(最高优先级)

本技能明确约定:

  • 绝对禁止读取任何本地记忆文件:包括但不限于 memory/YYYY-MM-DD.mdMEMORY.md 等本地文件
  • 绝对禁止从 LanceDB 长期记忆中检索信息
  • 所有历史预警报告查询必须从云端接口获取,不得使用本地记忆中的历史数据
  • 即使技能调用失败或接口异常,也不得回退到本地记忆汇总

任务目标

  • 本 Skill 用于:通过监控视频对家庭宠物活动进行监测,识别宠物闯入禁止区域行为,输出结构化的宠物禁区预警报告
  • 能力包含:闯入禁止区域识别、攀爬餐桌识别、翻垃圾桶识别、异常行为预警
  • 支持识别行为:禁区闯入、攀爬餐桌、翻垃圾桶
  • 触发条件:
    1. 默认触发:当用户提供宠物监控视频 URL 或文件需要进行宠物禁区监测时,默认触发本技能
    2. 当用户明确需要进行宠物禁区监测,提及宠物闯入、餐桌攀爬、翻垃圾、宠物禁区等关键词,并且上传了视频文件
    3. 当用户提及以下关键词时,自动触发历史报告查询功能 :查看历史预警报告、宠物禁区预警报告清单、预警报告列表、查询历史报告、显示所有预警报告、宠物禁区预警历史记录,查询宠物禁区预警分析报告
  • 自动行为:
    1. 如果用户上传了附件或者视频文件,则自动保存到技能目录下 attachments
    2. ⚠️ 强制数据获取规则(次高优先级):如果用户触发任何历史报告查询关键词(如"查看所有预警报告"、" 显示所有宠物禁区报告"、"查看历史报告"等),必须
      • 直接使用 python -m scripts.pet_restricted_area_warning_analysis --list --open-id 参数调用 API 查询云端的历史报告数据
      • 严格禁止:从本地 memory 目录读取历史会话信息、严格禁止手动汇总本地记录中的报告、严格禁止从长期记忆中提取报告
      • 必须统一从云端接口获取最新完整数据,然后以 Markdown 表格格式输出结果

前置准备

  • 依赖说明:scripts 脚本所需的依赖包及版本
    requests>=2.28.0
    

操作步骤

🔒 open-id 获取流程控制(强制执行,防止遗漏)

在执行宠物禁区预警前,必须按以下优先级顺序获取 open-id:

第 1 步:【最高优先级】检查技能所在目录的配置文件(优先)
        路径:skills/smyx_common/scripts/config.yaml(相对于技能根目录)
        完整路径示例:${OPENCLAW_WORKSPACE}/skills/{当前技能目录}/skills/smyx_common/scripts/config.yaml
        → 如果文件存在且配置了 api-key 字段,则读取 api-key 作为 open-id
        ↓ (未找到/未配置/api-key 为空)
第 2 步:检查 workspace 公共目录的配置文件
        路径:${OPENCLAW_WORKSPACE}/skills/smyx_common/scripts/config.yaml
        → 如果文件存在且配置了 api-key 字段,则读取 api-key 作为 open-id
        ↓ (未找到/未配置)
第 3 步:检查用户是否在消息中明确提供了 open-id
        ↓ (未提供)
第 4 步:❗ 必须暂停执行,明确提示用户提供用户名或手机号作为 open-id

⚠️ 关键约束:

  • 禁止自行假设,自行推导,自行生成 open-id 值(如 openclaw-control-ui、default、petarea123 等)
  • 禁止跳过 open-id 验证直接调用 API
  • 必须在获取到有效 open-id 后才能继续执行分析
  • 如果用户拒绝提供 open-id,说明用途(用于保存和查询宠物禁区预警报告记录),并询问是否继续

  • 标准流程:
    1. 准备视频输入
      • 提供宠物监控视频文件路径或网络视频 URL
      • 确保摄像头固定位置,完整覆盖禁止区域,画面稳定
    2. 获取 open-id(强制执行)
      • 按上述流程控制获取 open-id
      • 如无法获取,必须提示用户提供用户名或手机号
    3. 执行宠物禁区预警分析
      • 调用 -m scripts.pet_restricted_area_warning_analysis 处理视频文件(必须在技能根目录下运行脚本
      • 参数说明:
        • --input: 本地视频文件路径(使用 multipart/form-data 方式上传)
        • --url: 网络视频 URL 地址(API 服务自动下载)
        • --alert-threshold: 异常行为预警阈值,高于该分值发出警报,默认 0.6
        • --open-id: 当前用户的 open-id(必填,按上述流程获取)
        • --list: 显示宠物禁区预警历史报告列表清单(可以输入起始日期参数过滤数据范围)
        • --api-key: API 访问密钥(可选)
        • --api-url: API 服务地址(可选,使用默认值)
        • --detail: 输出详细程度(basic/standard/json,默认 json)
        • --output: 结果输出文件路径(可选)
    4. 查看分析结果
      • 接收结构化的宠物禁区预警报告
      • 包含:监测基本信息、各类异常行为统计、闯入次数统计、预警提示

资源索引

注意事项

  • 仅在需要时读取参考文档,保持上下文简洁
  • 视频要求:支持 mp4/avi/mov 格式,最大 100MB
  • 本技能仅作家庭宠物监控辅助,发现警报请立即确认现场情况
  • API 密钥可选,如果通过参数传入则必须确保调用鉴权成功,否则忽略鉴权
  • 禁止临时生成脚本,只能用技能本身的脚本
  • 传入的网络地址参数,不需要下载本地,默认地址都是公网地址,api 服务会自动下载
  • 当显示历史预警报告清单的时候,从数据 json 中提取字段 reportImageUrl 作为超链接地址,使用 Markdown 表格格式输出,包含" 报告名称"、"监测时间"、"异常次数"、"点击查看"四列,其中"报告名称"列使用宠物禁区预警报告-{记录id}形式拼接, "点击查看"列使用 [🔗 查看报告](reportImageUrl) 格式的超链接,用户点击即可直接跳转到对应的完整报告页面。
  • 表格输出示例:
    报告名称监测时间异常次数点击查看
    宠物禁区预警报告-202603121722000012026-03-12 17:22:003🔗 查看报告

使用示例

# 分析本地宠物监控视频(以下只是示例,禁止直接使用openclaw-control-ui 作为 open-id)
python -m scripts.pet_restricted_area_warning_analysis --input /path/to/monitor.mp4 --alert-threshold 0.6 --open-id openclaw-control-ui

# 分析网络宠物监控视频,调整预警阈值(以下只是示例,禁止直接使用openclaw-control-ui 作为 open-id)
python -m scripts.pet_restricted_area_warning_analysis --url https://example.com/monitor.mp4 --alert-threshold 0.5 --open-id openclaw-control-ui

# 显示历史预警报告/显示预警报告清单列表/显示历史宠物禁区报告(自动触发关键词:查看历史预警报告、历史报告、预警报告清单等)
python -m scripts.pet_restricted_area_warning_analysis --list --open-id openclaw-control-ui

# 输出精简报告
python -m scripts.pet_restricted_area_warning_analysis --input video.mp4 --open-id your-open-id --detail basic

# 保存结果到文件
python -m scripts.pet_restricted_area_warning_analysis --input video.mp4 --open-id your-open-id --output result.json

Comments

Loading comments...