Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

SZZG007 Background Investigation

v1.0.0

Comprehensive background investigation and profiling of customers, bloggers, and other individuals

0· 63·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for szzg007/szzg007-background-investigation.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "SZZG007 Background Investigation" (szzg007/szzg007-background-investigation) from ClawHub.
Skill page: https://clawhub.ai/szzg007/szzg007-background-investigation
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install szzg007-background-investigation

ClawHub CLI

Package manager switcher

npx clawhub@latest install szzg007-background-investigation
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (background investigation, profiling) match the SKILL.md, README, and the Python code. The code implements data-gathering simulation, content analysis, risk scoring, and report generation — all consistent with the stated purpose. The skill advertises social-media API integration, but config.py contains disabled placeholders (enabled: False) and there are no declared required credentials, which is coherent for a shipped demo/simulator but should be noted if you later enable real API access.
Instruction Scope
SKILL.md instructs the agent to gather publicly available social and public-records info and to produce reports. The included code follows that scope: it simulates social-media gathering, analyzes content, computes a trust score, and saves a JSON report. There are no instructions or code paths that read unrelated system secrets or contact hidden external endpoints in the provided files. The tool does write reports to disk in the current working directory.
Install Mechanism
There is no install specification (instruction-only packaging with included source files). No downloads, external installers, or archive extraction occur in the repository, which is lower risk.
Credentials
The skill declares no required environment variables, primary credential, or config paths. config.py contains placeholders for social-media API keys but those are disabled by default; therefore no unexpected credential access occurs as shipped. If you enable API integrations later you will need to provide credentials — those should be stored securely and reviewed before use.
Persistence & Privilege
The skill is user-invocable with normal agent autonomy settings (always: false, disable-model-invocation: false). It does not request permanent/global privileges and does not modify other skills or system-wide configurations.
Assessment
This repository implements a local/simulated background-investigation tool that generates JSON reports and does not, as provided, access external APIs or ask for credentials. Before installing or enabling it in a production agent: 1) Review and confirm legal/ethical compliance for investigating real people in your jurisdiction. 2) Inspect the code yourself (or have someone you trust do so) before enabling any social-media API integrations — config.py contains placeholders you must populate to use real APIs. 3) If you enable real APIs, store API keys/secrets securely (not in plaintext files committed to the skill directory) and understand the blast radius of those credentials. 4) Be aware the tool writes reports to disk (output files may contain personal data); ensure appropriate access controls or anonymization. 5) If you want the agent to gather live data automatically, add explicit checks and consent/permission handling; otherwise the current behavior is simulated and safe for testing.

Like a lobster shell, security has layers — review code before you run it.

latestvk978her4abgejjt4c44hsdrd8s84t1h3
63downloads
0stars
1versions
Updated 2w ago
v1.0.0
MIT-0

SZZG007 Background Investigation Skill

Overview

This skill performs comprehensive background investigations and profiling of customers, bloggers, and other individuals. It gathers and analyzes information from various sources to create detailed profiles and risk assessments.

Capabilities

  • Social media profiling (Twitter, Instagram, LinkedIn, TikTok, YouTube)
  • Public records search
  • Business affiliation verification
  • Online reputation analysis
  • Content analysis and sentiment evaluation
  • Network mapping and connections
  • Risk assessment and trust scoring
  • Historical activity timeline
  • Cross-reference verification

Usage

Use this skill when you need to investigate a customer, blogger, or other individual to understand their background, credibility, influence, and potential risks.

Investigation Process

  1. Initial data gathering from social media and public sources
  2. Cross-reference verification across multiple platforms
  3. Network analysis to identify connections and relationships
  4. Content analysis to assess interests, expertise, and reputation
  5. Risk assessment based on gathered information
  6. Profile compilation with key findings and recommendations

Data Sources

  • Social media platforms (with appropriate permissions)
  • Public databases and records
  • Professional networks
  • News articles and mentions
  • Content archives and historical posts
  • Business registries and affiliations

Privacy and Ethics

  • All investigations conducted within legal and ethical boundaries
  • Respect for privacy rights and data protection regulations
  • Focus on publicly available information
  • Transparent methodology and documented sources

Comments

Loading comments...