Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

微信公众号文章排版

v1.0.0

将 Markdown 文章转换为微信公众号兼容的精美内联样式 HTML,支持30主题、AI内容增强、代码高亮及一键复制推送。

1· 95·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the code and themes provided: format.py and publish.py plus many theme JSONs are appropriate for a typesetting/publish tool. However the registry metadata declares no required env vars or config paths while SKILL.md explicitly expects WECHAT_APP_ID and WECHAT_APP_SECRET from ~/.openclaw/.env and a local output_dir — this mismatch is unexpected and should be reconciled.
!
Instruction Scope
Runtime instructions tell the agent to read user-supplied Markdown paths, load ~/.openclaw/.env, write structured/enhanced Markdown and outputs into ~/WorkBuddy/wechat-typeset-pro, and run scripts that may open a browser and call publish.py to push to WeChat. Reading ~/.openclaw/.env (an arbitrary env-file) and writing into the user's home directory are broader operations than the metadata declares and raise data-exposure concerns if that file contains other secrets.
Install Mechanism
No install spec (instruction-only) — lower installation risk. But the skill includes two non-trivial Python scripts bundled with many theme files; those scripts will be executed directly by instructions (python3 ...). Bundled executable code increases risk compared to pure prose instructions and should be audited before running.
!
Credentials
SKILL.md expects WECHAT_APP_ID and WECHAT_APP_SECRET (reasonable for publish functionality) and says it will auto-load ~/.openclaw/.env. The skill metadata, however, lists no required env vars or config paths. Automatically loading a dotfile from ~/.openclaw may expose unrelated credentials; the discrepancy between declared and actual env access is an incoherence and privacy risk.
Persistence & Privilege
always:false and user-invocable:true (normal). The skill writes outputs under the user's home (~/WorkBuddy/wechat-typeset-pro) and references a vault_root in config.json (a hardcoded developer path). It does not request permanent platform-wide privileges, but its file I/O targets user home paths which should be acceptable but worth noting.
What to consider before installing
This skill appears to implement the advertised Markdown→WeChat HTML workflow and to include publishing support, but there are mismatches and privacy concerns you should address before installing: - The SKILL.md says it auto-loads ~/.openclaw/.env for WECHAT_APP_ID and WECHAT_APP_SECRET, but the skill metadata lists no required env vars — expect to provide WeChat credentials if you use publishing. Confirm the metadata reflects this. - Inspect scripts/publish.py and scripts/format.py (search for network endpoints, external hosts, and any non-WeChat POST destinations). Verify publish.py uses official WeChat API endpoints (e.g., api.weixin.qq.com) and does not send content/credentials to other servers. - Check what exactly the loader does with ~/.openclaw/.env. If it blindly loads every variable from that file into the process, it could expose unrelated secrets. Consider moving only the necessary WECHAT credentials to a dedicated env file or pass them at runtime. - Because the skill bundles runnable Python code, run it first in an isolated environment (container or VM) and use --dry-run where available. Review logs and network traffic during a test run. - Verify the output directory and any hardcoded paths (config.json.vault_root) are acceptable for your environment; change them before running if needed. If you want, I can: (a) scan the full contents of scripts/format.py and scripts/publish.py for network calls, string obfuscation, or secret exfiltration indicators; or (b) suggest minimal sandbox commands to run a safe dry-run.

Like a lobster shell, security has layers — review code before you run it.

latestvk978n5dj436f3c4z1prefgkcqd84412a

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments