Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

ZeeLin多平台自运营

v0.6.1

ZeeLin多平台自运营 — 通义千问 +《四大平台内容生产提示词手册》生成各平台稿,CDP 顺序运营 X / 微博 / 小红书 / 微信公众号草稿。MIT-0 on ClawHub.

0· 130·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for kelcey2023/zeelin-social-autopublisher.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "ZeeLin多平台自运营" (kelcey2023/zeelin-social-autopublisher) from ClawHub.
Skill page: https://clawhub.ai/kelcey2023/zeelin-social-autopublisher
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install zeelin-social-autopublisher

ClawHub CLI

Package manager switcher

npx clawhub@latest install zeelin-social-autopublisher
Security Scan
Capability signals
Posts externally
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's name/description (multi‑platform autopublisher) matches the included code: content generation + Chrome CDP automation for X/Weibo/XHS/WeChat. However the registry metadata declares no required env vars or binaries while the scripts clearly expect: a running local Chrome/Chromium with --remote-debugging-port, and optional API keys (DASHSCOPE_API_KEY / QWEN_API_KEY). That mismatch (metadata understates requirements) is an incoherence users should notice.
!
Instruction Scope
Runtime instructions tell you to run the provided shell wrappers which will: source a local ~/.openclaw/zeelin-qwen.env if present, call generate_content.py (which will call DashScope/Qwen or fall back to templates), enumerate Chrome CDP tabs, extract tokens from tab URLs (WeChat token), execute JavaScript in pages to fill forms and click publish, and provide continuous/looping autoops scripts. These actions go beyond simple text generation: they read local env files, inspect browser tabs (including URL query parameters), and drive logged‑in browser sessions — all of which are powerful and can result in posting from your accounts.
Install Mechanism
No install spec is supplied (instruction‑only skill with bundled scripts). This is lower installation risk than an arbitrary download/install step — nothing external is installed by the skill itself.
!
Credentials
The package uses several environment variables (DASHSCOPE_API_KEY / QWEN_API_KEY / QWEN_API_BASE / OPENCLAW_CDP_PORT / OPENCLAW_SKILLS_ROOT / OPENCLAW_CLI / THUQX_ALLOW_TEMPLATE_FALLBACK etc.) but the registry metadata lists none. In particular, the scripts will source ~/.openclaw/zeelin-qwen.env automatically if present; that file may contain secrets. The use of a remote LLM API key (DashScope/Qwen) is justified for content generation, but the skill should have declared these requirements explicitly.
Persistence & Privilege
always:false (good). However the skill includes 'continuous' looping scripts (run_continuous_ops.sh / run_autoops_engine.sh) which will repeatedly generate and post content if started. The skill can be invoked autonomously by the agent (platform default); combined with browser control, that could autonomously publish posts — be cautious about allowing unattended invocation.
What to consider before installing
What to check before installing or running this skill: - Metadata mismatch: the package DOES expect a local Chrome/Chromium with remote debugging (--remote-debugging-port) and may use a DashScope/QWEN API key, but the registry entry lists no required env vars — assume you must supply these manually. - Browser control: the scripts connect to Chrome DevTools Protocol, enumerate tabs, extract tokens from tab URLs (WeChat) and execute JS to fill forms and click publish. Only use with a dedicated browser profile where you are signed into the correct accounts; do not run against a primary browser profile with other sensitive sessions. - Secrets handling: the scripts will source ~/.openclaw/zeelin-qwen.env if present. Inspect that file before creating it; do not put unrelated or high‑privilege secrets there. If you provide DASHSCOPE_API_KEY / QWEN_API_KEY, ensure you understand DashScope's access and billing implications. - Test in dry‑run: run the provided test scripts (run_four_platform_test.sh) or run components manually and observe behavior before enabling continuous mode. Consider modifying scripts to a 'fill only / save draft' mode for first runs. - Autonomous runs: avoid granting the agent unrestricted autonomous invocation if you are not prepared for automatic posting. If possible, run the skill interactively and review generated content before publishing. - Source trust: the skill source and owner are unknown and there is no homepage. If you require stronger assurance, run the code in a sandboxed environment, or review every script line‑by‑line (particularly CDP JS snippets) before use.

Like a lobster shell, security has layers — review code before you run it.

cdpvk976pt7hjxnf1r1c4w2kqnt4bh84c79hlatestvk976pt7hjxnf1r1c4w2kqnt4bh84c79hopenclawvk976pt7hjxnf1r1c4w2kqnt4bh84c79hsocialvk976pt7hjxnf1r1c4w2kqnt4bh84c79hthuqxvk976pt7hjxnf1r1c4w2kqnt4bh84c79htwittervk976pt7hjxnf1r1c4w2kqnt4bh84c79hwechatvk976pt7hjxnf1r1c4w2kqnt4bh84c79hweibovk976pt7hjxnf1r1c4w2kqnt4bh84c79hxiaohongshuvk976pt7hjxnf1r1c4w2kqnt4bh84c79hzeelinvk976pt7hjxnf1r1c4w2kqnt4bh84c79h
130downloads
0stars
5versions
Updated 3w ago
v0.6.1
MIT-0

ZeeLin多平台自运营 — 自包含包:根目录为技能根,scripts/generate_content.py 与同目录 四大平台内容生产提示词手册.md 需一并保留。

解压/安装后,在技能根目录执行:

bash scripts/run_social_ops_v5.sh "你的主题"

须配置 DashScopeDASHSCOPE_API_KEY 等);可将 ~/.openclaw/zeelin-qwen.env 置于本机并由 _thuqx_cdp_common.sh 自动 source(若存在)。

详见包内 OPENCLAW.md(若附带)或 README.md

Comments

Loading comments...