Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Weibo Operations

v1.0.0

Weibo (微博) write operations via DrissionPage + Chrome CDP. Post, delete, repost, comment, and like on weibo.com. Activate when user asks to publish/delete/re...

0· 46·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (Weibo write operations via DrissionPage + CDP) matches what the Python script does: drive a real Chrome instance to post/repost/comment/like/delete. Copying a Chrome profile to reuse a logged-in session is a plausible implementation choice, but the script copies many profile files (Cookies, Login Data, Local Storage, etc.) which grants access to unrelated site sessions and secrets — more than the SKILL.md declares.
!
Instruction Scope
SKILL.md instructs the user to run scripts/start_chrome.sh which copies files from the user's Chrome profile into /tmp and launches Chrome with remote debugging; that requires reading sensitive local browser state. The runtime instructions and code show no network exfiltration, but they do perform destructive actions (delete_all) on the user's Weibo account. The instructions do not call out the full scope of file access or warn about copying profile data.
Install Mechanism
There is no external install or remote download; the skill is instruction + local scripts. That keeps install risk low — nothing is fetched from arbitrary URLs. The only dependency is DrissionPage via pip (declared in README).
!
Credentials
The skill does not declare any required config paths or credentials but the start_chrome.sh script requires read access to $HOME/Library/Application Support/Google/Chrome (macOS Chrome profile) and copies sensitive files like Cookies and Login Data. This is a disproportionate and undeclared access to local secrets/config. Also, the script assumes a macOS Chrome path but the skill metadata lists no OS restriction.
Persistence & Privilege
always is false and the skill does not request persistent platform-wide privileges. It copies a profile to /tmp (ephemeral) and launches a Chrome instance with remote debugging; this is local and not persistent beyond runtime. The skill can perform destructive actions on the user's Weibo account (delete_all), which is expected for its purpose but operationally sensitive.
What to consider before installing
This skill automates a locally running Chrome to perform Weibo actions and does that by copying your Chrome profile (Cookies, Login Data, Local Storage, etc.) into /tmp and launching Chrome with remote debugging. Before installing or running it: 1) Understand that copying the profile exposes all browser sessions stored in that profile — use a dedicated / throwaway Chrome profile that contains only the Weibo login if you want to limit exposure. 2) The startup script hardcodes a macOS Chrome path; it will not work as-is on Linux/Windows and the SKILL.md does not mention this. 3) Inspect the included scripts yourself (start_chrome.sh and weibo_ops.py) — they appear to operate locally and do not exfiltrate data, but executing arbitrary scripts that copy your browser profile is sensitive. 4) Because the skill can delete posts, avoid running destructive actions (delete_all) until you test in a safe account. 5) If you cannot verify code or isolate the environment, do not run the script against your main Chrome profile or primary account.

Like a lobster shell, security has layers — review code before you run it.

latestvk975x99k8m21c9j6wpzmgxh5ks84na53

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments