Fbs Bookwriter.Skip

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.dangerous_exec

Findings (33)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run unsandboxed, the skill's scripts may have broader access to local files and the host environment than a user expects from a writing tool.

Why it was flagged

The skill explicitly depends on shell/exec and suggests disabling the sandbox as a troubleshooting option. That expands the impact of any script or dependency beyond a tightly contained writing workspace.

Skill content
使用 OpenClaw **exec / shell**;**cwd 必须为技能根** ... 若 OpenClaw 在 Docker 沙箱中运行且未注入宿主 `env`,需 ... 配置 `sandbox.docker.env` 或关闭沙箱
Recommendation

Keep the sandbox enabled when possible, approve each command, and run the skill only in a dedicated book project directory.

What this means

The skill can run local programs, so a faulty or unexpected script could affect the local environment.

Why it was flagged

Static scan evidence shows the package can spawn local processes. This is mostly aligned with the disclosed Node-script workflow, but PowerShell bypass behavior is sensitive and should stay user-approved.

Skill content
const r = spawnSync('powershell', ['-NoProfile', '-ExecutionPolicy', 'Bypass', '-File', tmpPs1], {
Recommendation

Review scripts before running optional diagnostics, and do not allow the agent to execute unfamiliar commands automatically.

What this means

Installing dependencies may download third-party packages to the local environment.

Why it was flagged

The skill requires a manual npm dependency install. That is normal for a Node-based document tool, but dependency provenance is part of the trust boundary.

Skill content
在技能根执行一次依赖安装:`npm install`(Node ≥18;可选依赖用于 HTML/Docx 等,见 `package.json` `optionalDependencies`)。
Recommendation

Inspect package.json and use a trusted network/environment before running npm install.

What this means

The skill may involve account authentication, sensitive credentials, or paid/credit-based actions that are not obvious from the main installation contract.

Why it was flagged

These high-impact account and credential capabilities are reported even though the registry requirements state no required env vars and no primary credential, and SKILL.md does not clearly explain when such credentials or purchases are needed.

Skill content
can-make-purchases; requires-oauth-token; requires-sensitive-credentials
Recommendation

Do not provide OAuth tokens, WeCom credentials, payment, or credit-related access unless the workflow clearly asks for it and you understand the scope.

What this means

Personal profile or writing-preference data could be reused across sessions or projects in ways the user may not expect.

Why it was flagged

The artifacts describe importing host-level user profile memory into the writing system. That can be useful for personalization, but the user-facing install text does not clearly bound when profile memory is read, how long it is retained, or how it can be reset.

Skill content
状态:... 宿主融合记忆已并入 v2.1.2 主入口 ... 读取 memery 为画像种子 ... `~/.workbuddy/memery/{UID}_memery.md`
Recommendation

Ask the skill to disclose memory reads/writes, review the .fbs memory files, and provide a clear reset/delete path before using profile-based personalization.

Findings (33)

critical

suspicious.dangerous_exec

Location
scripts/agents/audit-agent.mjs:83
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/audit-query-optimization.mjs:10
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/audit-temporal-accuracy.mjs:10
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/audit-term-consistency.mjs:10
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/deploy-agent.mjs:584
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/research-agent.mjs:109
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/validation-agent.mjs:75
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/agents/writing-agent.mjs:234
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/audit-entry-performance.mjs:37
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/book-health-snapshot.mjs:52
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/delivery-chain.mjs:27
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/env-preflight.mjs:57
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/evolution-gate.mjs:29
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/fbs-cli-bridge.mjs:27
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/fbs-doctor.mjs:25
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/init-project-memory.mjs:55
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/intake-router.mjs:118
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/launch-presentation-preview.mjs:187
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/lib/channel-pack.mjs:283
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/lib/git-workspace-changes.mjs:24
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/lib/pack-skill-gates.mjs:150
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/lib/workbuddy-host-runtime.mjs:61
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/midterm-execution-chain.mjs:61
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/polish-gate.mjs:259
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/publish-clawhub.mjs:65
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/quality-audit-incremental.mjs:123
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/quality-panorama-orchestrator.mjs:198
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/run-p0-audits.mjs:82
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/s3-guard.mjs:84
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/s3-start-gate.mjs:142
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/smoke-pack-verify.mjs:14
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/standard-execution-chain.mjs:109
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/wecom/wecom-client.mjs:97
Finding
Shell command execution detected (child_process).