Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

京东返利

v1.0.1

返利宝统一技能。只按 3 个用户场景工作:S01 授权与教程、S02 链接返利、S03 商品搜索。用户说“返利”“教程”“详细教程”“提现教程”“提现10元”“确认提现”“我已授权”“账户余额”等走 S01;发送淘宝、京东、拼多多商品链接走 S02;表达想买什么商品时走 S03。S03 的职责是提取商品搜索信息,...

0· 89·0 current·0 all-time
bywuweizhen@skyfile
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (京东返利 / 返利宝) align with code: link recognition, product search, rebate-link creation and withdraw flows are implemented. The skill also supports Taobao and 拼多多 in addition to 京东; that's reasonable but the name could be narrower. No unrelated credentials or binaries are requested.
!
Instruction Scope
SKILL.md and scripts require calling local scripts (cli/*.js) and returning their stdout verbatim. Runtime behavior includes reading/writing local binding info (machine code / openid) and calling remote APIs for search, lease, link creation and withdraw. The docs instruct users to visit and follow a third‑party URL for auth. These network interactions and persistent local bindings are within the skill's stated scope, but they constitute data flows to an external service that are not explicitly declared in the registry metadata.
Install Mechanism
Registry lists no install spec, but SKILL.md contains explicit build instructions (npm install && npm run build). Running those commands may fetch npm packages and run lifecycle scripts. The package install is not automated in the manifest, so risk depends on whether you run the provided build steps — review package.json/build scripts before executing.
Credentials
The skill declares no required env vars or credentials, which is consistent. However, it hard-codes external URLs (e.g., https://xiaomaxiangshenghuo.io.mlj130.com/*) used for auth/follow/rebate pages and likely uses a backend API. The skill persists a local machine identifier and user openid; these are sensitive (identifiers/authorization) and are required for core functionality but are not documented in the registry entry.
Persistence & Privilege
always:false and default autonomous invocation are fine. The skill reads/creates local bindings (machine code, openid) and stores pending auth requests — local persistence is expected for an auth flow but gives the skill ongoing state tied to the local agent. It does not request global system settings or other skills' credentials.
What to consider before installing
This skill appears to implement the described rebate workflows (search, recognize links, create rebate links, withdraw) but it depends on an external backend and persists a local machine id / openid. Before installing or running it: 1) Inspect scripts/common.js (or package.json) to find the exact backend API base URL(s) and any npm lifecycle scripts. 2) Verify the external domain (xiaomaxiangshenghuo.io.mlj130.com) is legitimate for the service and acceptable to you; the skill directs users to that domain for WeChat authorization. 3) Avoid running npm install/build in an untrusted environment — run in an isolated container or review dependencies first. 4) Understand that using the skill will send user messages and a local machine identifier/openid to the backend; if you need to protect privacy or credentials, do not enable it until you confirm the backend and data handling. If you can, ask the publisher for a homepage, privacy policy, or source-of-truth API docs for the backend — absence of those increases risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ff731nwvfvf5jzvn2f7x7xh84m1vd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments