Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Telegram Group Moderation

v0.9.0

Moderate Telegram groups with a bot by receiving message/webhook events, extracting text/caption/media context, applying anti-advertising and anti-contact po...

0· 209·0 current·0 all-time
byXavier Mary@xaviermary56

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for xaviermary56/telegram-group-moderation.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Telegram Group Moderation" (xaviermary56/telegram-group-moderation) from ClawHub.
Skill page: https://clawhub.ai/xaviermary56/telegram-group-moderation
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required binaries: python3
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install telegram-group-moderation

ClawHub CLI

Package manager switcher

npx clawhub@latest install telegram-group-moderation
Security Scan
Capability signals
Requires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name, description, and bundled examples consistently implement a Telegram webhook -> moderation-core -> Telegram-action integration layer, which is coherent with the declared purpose. However the registry metadata omits key runtime requirements (no declared env vars or primary credential) even though the SKILL.md and example scripts clearly need bot tokens and moderation endpoint credentials.
Instruction Scope
SKILL.md and the example scripts stay within the stated scope (normalize Telegram updates, call an external moderation core, map results to actions and log). They direct the agent to POST message content and metadata to an external moderation endpoint and to call the Telegram API using a bot token. This is expected for an integration layer, but the instructions require transmitting message content and identifiers to an external endpoint (MODERATION_CORE_ENDPOINT) — make sure that endpoint is trusted and that you consent to sending this data.
Install Mechanism
No install spec is provided (instruction-only plus example scripts), so nothing will be automatically downloaded or executed by an installer. Example code is bundled (Python/Go/Java), which is low-risk from an install vector perspective but means you should review and run examples yourself rather than relying on an installer.
!
Credentials
The skill uses multiple sensitive environment variables in its examples and docs but the registry metadata lists none. Examples reference: TELEGRAM_BOT_TOKEN, TELEGRAM_WEBHOOK_SECRET, MODERATION_CORE_ENDPOINT, MODERATION_CORE_TOKEN, TELEGRAM_API_BASE, TELEGRAM_ADMIN_REVIEW_CHAT_ID, TELEGRAM_WARN_MESSAGE_TEMPLATE, TELEGRAM_MUTE_SECONDS, plus Redis/DB credentials in docs. Not declaring these in metadata is an incoherence — the skill will not function without these secrets, and they are central to its operation (bot token allows Telegram actions; moderation endpoint receives message content).
Persistence & Privilege
The skill does not request 'always: true' or any elevated platform privileges and does not modify other skills. It performs network calls and may persist moderation logs according to user configuration (DB/Redis/file), which is expected. Autonomous invocation is allowed (platform default) — combine this with the credential mismatch when deciding whether to enable it.
What to consider before installing
This package is an integration skeleton that will forward Telegram updates and message content to an external moderation endpoint and perform Telegram API actions using a bot token. Before installing or enabling it: 1) Confirm the source repository and review the example scripts yourself. 2) Do not supply real production secrets until you audit the code. The examples require TELEGRAM_BOT_TOKEN and MODERATION_CORE_ENDPOINT (and optionally MODERATION_CORE_TOKEN, TELEGRAM_WEBHOOK_SECRET, etc.), but the registry metadata doesn't declare these — expect to set them as environment variables. 3) Ensure the moderation endpoint is trusted (you are intentionally sending message text, chat_id, user_id, and related metadata). 4) Use a test Telegram bot and a test group with dry-run enabled first; restrict allowed_chat_ids and allowed hosts in configuration. 5) If you plan to run this in production, prefer storing tokens in a secrets manager, enable webhook secret verification, and move offense storage to Redis/DB rather than local files. If you need higher assurance, ask the publisher to update the package metadata to declare required env vars and runtime binaries and to provide a release provenance (signed release or known GitHub release) before deployment.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Binspython3
latestvk97de3kx5y9c4wmxqkn9gwc8bs84w3yq
209downloads
0stars
5versions
Updated 23h ago
v0.9.0
MIT-0

Telegram Group Moderation

Build Telegram group moderation as an integration layer, not as a replacement for your existing moderation policy skill.

Recommended architecture:

  • use post-content-moderation as the moderation-policy core
  • use this skill to receive Telegram updates, normalize Telegram payloads, call the moderation core, and execute Telegram moderation actions

Core responsibilities

Use this skill for:

  • Telegram Bot webhook integration
  • Telegram group message normalization
  • extracting text, caption, media URL/file metadata, sender info, and chat info
  • mapping moderation results into Telegram actions
  • enforcing group-specific whitelist / admin-exemption / punishment rules
  • logging moderation decisions for audit

Do not bloat this skill with generic moderation policy text that already belongs in post-content-moderation.

Recommended decision flow

  1. Receive Telegram update.
  2. Detect update type:
    • message
    • edited_message
    • channel_post
    • edited_channel_post
  3. Extract moderation input:
    • chat_id
    • message_id
    • user_id
    • username / display name
    • text
    • caption
    • photo / video presence
    • forwarded / reply / sticker / invite-link hints if needed
  4. Normalize into a moderation payload.
  5. Call moderation core.
  6. Map result into Telegram action:
    • pass -> no action
    • reject -> delete / warn / mute / ban depending on rule set
    • review -> flag to admin channel or log queue
  7. Persist result and evidence.

Action mapping

Use clear business mapping. Example:

  • pass -> allow
  • reject + high risk -> delete message and warn user
  • reject + repeated violations -> delete and mute
  • reject + explicit scam/spam pattern -> delete and ban
  • review -> forward summary to admin review channel

Keep action policy configurable per group.

Telegram-specific rule inputs

Add these rule dimensions on top of the generic moderation core:

  • allowed chat ids
  • admin / moderator user whitelist
  • trusted service bots whitelist
  • punishment ladder by offense count
  • whether edited messages should be re-audited
  • whether forwarded posts are allowed
  • whether links are fully blocked or only ad-like links are blocked
  • whether usernames / bios / display names count as diversion evidence

Media limitations

Telegram integration often needs more than plain text:

  • image moderation may require OCR and QR detection
  • video moderation may require frame extraction and subtitle/ASR pipeline
  • file_id alone is not enough for real moderation; fetch or proxy media only when policy and privacy requirements allow it

If real media inspection is not implemented, document that clearly and avoid claiming full image/video moderation coverage.

Security baseline

  • validate Telegram webhook authenticity at the integration layer
  • verify chat allowlist before processing
  • keep bot token and API keys only in environment variables
  • rate-limit admin actions and callback retries
  • log delete/mute/ban actions with chat_id, user_id, message_id, and moderation reason
  • avoid downloading media to unsafe temp paths
  • define retention policy for moderated content snapshots

Bundled references

Read these files as needed:

  • references/architecture.md for recommended system design
  • references/telegram-event-mapping.md for Telegram update normalization
  • references/action-policy.md for pass/reject/review to delete/warn/mute/ban mapping
  • references/php-yaf-integration.md for PHP 7.3 / Yaf-oriented integration notes
  • references/multi-language-integration.md for Python, Go, and Java integration guidance
  • references/install-and-usage.zh-CN.md for practical Chinese installation and configuration guidance
  • references/production-rollout.zh-CN.md for production rollout boundaries and deployment advice
  • references/http-contract-example.json for request/response contract example with moderation core
  • references/http-contract-production.zh-CN.md for production HTTP contract guidance
  • references/http-contract-production-v2.zh-CN.md for trace_id-aware production contract guidance
  • references/redis-db-offense-store.zh-CN.md for Redis/DB offense-count design guidance
  • references/db-schema-example.sql for default DB offense-log schema
  • references/audit-log-schema-example.sql for audit-log schema
  • references/audit-log-rollout.zh-CN.md for audit-log rollout guidance
  • references/config-template.env.example for environment template hints
  • references/release-notes.zh-CN.md for Chinese release notes
  • references/clawhub-release-copy.zh-CN.md for Chinese release copy and page wording

Bundled scripts

Use bundled scripts as starting points, not production-final code:

  • scripts/config.php for env-driven config layout
  • scripts/telegram_support.php for shared constants and helpers
  • scripts/telegram_webhook_example.php for PHP webhook entry example
  • scripts/telegram_action_example.php for PHP Telegram Bot API action calls
  • scripts/python_telegram_webhook_example.py for Python webhook/action flow example
  • scripts/go_telegram_webhook_example.go for Go webhook/action flow example
  • scripts/java_telegram_webhook_example.java for Java webhook/action flow example

Packaging guidance

Keep this skill platform-specific and small:

  • Telegram ingress and action logic belongs here
  • reusable moderation policy belongs in post-content-moderation
  • if you later add Discord/WhatsApp, create separate integration skills instead of mixing all platforms into one

Comments

Loading comments...