Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

VideoClaw Pro

v1.0.0

视频剪辑脚本执行助手(增强版)- 根据飞书提示词库和直播素材文字档生成剪辑建议脚本。 支持飞书文档(docx)和知识库(wiki)链接,自动解析权限问题。 ⚠️ 重要:本 skill 所有文档读取必须通过 Python CLI 脚本,不使用内置 feishu_doc 工具! 触发指令格式:「剪辑脚本 [视频类型]...

0· 15·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Name/description match the code: the skill reads Feishu docx/wiki links, converts wiki nodes, and writes generated scripts back to Feishu. However, the skill embeds a Feishu APP_ID and APP_SECRET in videoclaw_lib.py instead of declaring required credentials or using the host's feishu_doc tool as SKILL.md forbids — this is an unexpected design choice even if it can be explained technically.
Instruction Scope
SKILL.md restricts all document I/O to the included Python CLI and shows explicit read/write exec commands. The instructions do not ask the agent to read unrelated local files or environment variables. The runtime actions (resolve wiki → fetch document blocks → generate script → create doc) are within the stated purpose.
Install Mechanism
No install spec is provided (instruction-only + included Python files). The Python code depends on third-party packages (requests, lark_oapi, python-docx) but those dependencies are not declared. That omission can lead to runtime failures or unexpected additional installs on the host; it's a completeness/usability concern rather than an immediate malware indicator.
!
Credentials
The skill requests no environment variables in metadata, yet videoclaw_lib.py hardcodes APP_ID and APP_SECRET (feishu credentials). Hardcoded service credentials in shipped code are disproportionate: they grant the skill-owner's service account access to any documents users share with that robot. Users must explicitly share documents with the robot account (as SKILL.md instructs), meaning private documents will be accessible to an external service — a significant privacy/trust consideration that is not surfaced in the metadata.
Persistence & Privilege
The skill is not marked always:true and does not appear to modify other skills or global agent settings. However, because the skill includes its own Feishu service credentials, installing and using it effectively grants persistent third-party access to any documents you share with that robot account while the credentials remain valid.
What to consider before installing
This skill's functionality (read Feishu doc/wiki, generate clip scripts, write back) is coherent, but there are two red flags you should consider before installing: 1) Hardcoded credentials: videoclaw_lib.py contains APP_ID and APP_SECRET inside the repository. That means the skill will use the author's/owner's Feishu service account to access documents. If you follow the skill's steps (sharing docs with the robot), those documents become accessible to that external account. Only proceed if you trust the skill author and understand that private content will be accessible to their robot. 2) Missing dependency/credential declarations: the metadata lists no required env vars or binaries, but the code needs Python packages (requests, lark_oapi, python-docx) and network access. The skill also forbids using the built-in feishu_doc tool and forces using the included CLI, increasing reliance on the embedded credentials. Recommendations before installation: - Ask the author to remove hardcoded APP_SECRET and instead require the operator to provide credentials via environment variables (declared in requires.env), or to use an OAuth flow that uses the user's own app credentials. - If you cannot get that change, do not share private documents with the robot; instead test with non-sensitive docs. - Verify the APP_ID belongs to a trusted owner (ask for the organization or app registration details) and request an explanation why the built-in feishu_doc tool couldn't be used. - Ensure required Python dependencies are installed in a controlled environment before running the CLI. If the author can provide a version that uses the user’s own credentials (or the platform's built-in feishu_doc tool) and lists dependencies, the concerns would be largely resolved. If the APP_SECRET here is confirmed malicious or unknown and the author refuses to remove it, treat the skill as untrusted.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fkmbrg662j12bnda8rjhzqn84g645

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments