Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

High-Risk Behavior Identification & Analysis Tool | 高风险行为识别分析工具

v1.0.0

Supports identifying high-risk behaviors and health risks through video/images, including elderly falls, precursors to heart attacks and strokes, and abnorma...

0· 68·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for smyx-sunjinhui/new-smyx-risk-analysis.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "High-Risk Behavior Identification & Analysis Tool | 高风险行为识别分析工具" (smyx-sunjinhui/new-smyx-risk-analysis) from ClawHub.
Skill page: https://clawhub.ai/smyx-sunjinhui/new-smyx-risk-analysis
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install new-smyx-risk-analysis

ClawHub CLI

Package manager switcher

npx clawhub@latest install new-smyx-risk-analysis
Security Scan
Capability signals
Requires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The code and SKILL.md are consistent with a video/image health-risk analysis service that calls a remote API to perform heavy-lift analysis. However the packaged requirements and included modules (langchain, OpenAI, many server/web frameworks and tooling) are far broader than expected for a focused CV analysis client, which is disproportionate and unexplained.
!
Instruction Scope
Runtime instructions require reading local config files for an 'open-id' and then uploading frames/files to a remote API. The skill will transmit images/frames and user identifiers to external endpoints and can send alerts to webhooks. That behavior is coherent with the stated feature but it collects and transmits sensitive biometric and personal identifiers (open-id/phone/username) — this is high-risk and should be explicitly disclosed to users.
Install Mechanism
No install spec is provided (no downloads at install time), but the repository includes many source files and a large requirements.txt. The dependency list is much larger than necessary for simple CV client behavior, increasing attack surface and supply-chain risk.
!
Credentials
The skill reads environment variables and config files not declared in the registry metadata: RISK_ANALYSIS_API_KEY, RISK_ANALYSIS_API_URL (DEFAULT_API_URL), ALERT_FEISHU_WEBHOOK, ALERT_WEBHOOK_URL, and OPENCLAW_SENDER_* may influence behavior. The SKILL.md also requires an 'open-id' and instructs reading workspace config files to find an api-key; asking for usernames/phone numbers and using them as identifiers raises privacy concerns. These env/config accesses should be declared and justified.
Persistence & Privilege
The skill does not request always:true and does not modify other skills. It performs file reads/HTTP requests at runtime which are expected for this capability; no elevated platform privileges are requested.
What to consider before installing
This skill will read local config files and environment variables and send images/frames and user identifiers (open-id/username/phone) to remote APIs and webhooks (defaults point to lifeemergence domains). Before installing or using it: 1) Confirm the exact remote API endpoint(s) and the operator/owner of that service and their privacy policy (who stores the images, for how long, and where). 2) Do not upload real patient or identifiable video until you trust the destination. 3) Ask the author why so many unrelated dependencies are packaged (reduce to only CV libs if possible). 4) Ensure required env vars and webhooks are declared and you control them (avoid secret leakage). 5) If you need auditability, request source-of-truth for ApiEnum.BASE_URL_* values and a minimal dependency manifest. If the author cannot clearly justify remote hosts, credentials usage, and dependency choices, treat this skill as risky and avoid using it with sensitive data.
!
skills/smyx_common/scripts/config-dev.yaml:2
Install source points to URL shortener or raw IP.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f6kxhj8z44g02vt554ym3xn84ww80
68downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

High-Risk Behavior Identification & Analysis Tool | 高风险行为识别分析工具

Deeply integrating Computer Vision, Pose Estimation, and Multimodal Health Risk Recognition algorithms, this feature constructs an intelligent early warning system designed for high-risk behaviors and sudden health events. The system analyzes individual behavior patterns and physiological manifestations in real-time from video or images. It precisely captures high-risk behaviors such as sudden posture changes during falls or prolonged stillness indicating abnormal retention. Simultaneously, by analyzing visual cues like facial microcirculation changes, abnormal skin color, and decreased limb coordination, it assists in identifying precursors to sudden diseases such as heart attacks and strokes.
Leveraging temporal behavior modeling and risk assessment models, the system effectively distinguishes between daily activities and potential dangers. Once an anomaly is detected, it immediately triggers a multi-level warning mechanism, notifying family members and caregivers via APP push, SMS, and voice broadcasts. It synchronously transmits anomaly footage, risk type, and location information. This provides 24/7, unobtrusive, and precise safety protection for high-risk groups like the elderly living alone and chronic disease patients, realizing a closed-loop health management system that shifts from passive response to active prevention.

本功能深度融合计算机视觉、姿态估计与多模态健康风险识别算法,构建了一套面向高危行为与突发健康事件的智能预警系统。系统可实时解析视频或图片中的个体行为模式与生理表征,精准捕捉老人跌倒时的姿态骤变、异常滞留时的长时间静止等高危行为,同时通过面部微循环变化、肤色异常、肢体协调性下降等视觉线索,辅助识别心梗、脑梗等突发疾病的前兆特征。借助时序行为建模与风险等级评估模型,系统能够有效区分日常活动与潜在危险,一旦检测到异常,立即触发分级预警机制,通过APP推送、短信、语音播报等多渠道通知家属及护理人员,并同步发送异常画面、风险类型与位置信息,为独居老人、慢性病患者等高风险群体提供7×24小时无感化、精准化的安全守护,实现从被动应对到主动预防的健康管理闭环

任务目标

  • 本 Skill 用于:通过视频或图片分析识别高风险行为和健康风险,及时发出预警
  • 能力包含:跌倒识别、异常行为检测、心梗脑梗前兆识别、健康风险评估、实时预警
  • 触发条件:仅当用户明确提及"风险分析"、"跌倒"、"跌倒检测"、"行为识别"、"安全监测"、"老人看护"、"风险识别"、"高危风险识别" 时才触发本技能。默认情况下,视频/URL分析应该触发中医面诊分析(face_analysis)技能,不触发本技能(**除非最近一次执行了风险分析或者提及风险分析 **)。
  • 支持输入:本地视频/图片文件、网络视频/图片URL、实时流地址

前置准备

  • 依赖说明:scripts脚本所需的依赖包及版本
    requests>=2.28.0
    opencv-python>=4.5.5
    numpy>=1.21.0
    pillow>=9.0.0
    

操作步骤

🔒 open-id 获取流程控制(强制执行,防止遗漏)

在执行风险分析前,必须按以下优先级顺序获取 open-id:

第 1 步:【最高优先级】检查技能所在目录的配置文件(优先)
        路径:skills/smyx_common/scripts/config.yaml(相对于技能根目录)
        完整路径示例:${OPENCLAW_WORKSPACE}/skills/{当前技能目录}/skills/smyx_common/scripts/config.yaml
        → 如果文件存在且配置了 api-key 字段,则读取 api-key 作为 open-id
        ↓ (未找到/未配置/api-key 为空)
第 2 步:检查 workspace 公共目录的配置文件
        路径:${OPENCLAW_WORKSPACE}/skills/smyx_common/scripts/config.yaml
        → 如果文件存在且配置了 api-key 字段,则读取 api-key 作为 open-id
        ↓ (未找到/未配置)
第 3 步:检查用户是否在消息中明确提供了 open-id
        ↓ (未提供)
第 4 步:❗ 必须暂停执行,明确提示用户提供用户名或手机号作为 open-id

⚠️ 关键约束:

  • 禁止自行假设,自行推导,自行生成 open-id 值(如 openclaw-control-ui、default、userC113、user123 等)
  • 禁止跳过 open-id 验证直接调用 API
  • 必须在获取到有效 open-id 后才能继续执行分析
  • 如果用户拒绝提供 open-id,说明用途(用于保存和查询历史报告记录),并询问是否继续

  • 标准流程:
    1. 准备输入源
      • 支持本地视频/图片路径、网络URL、RTSP实时流地址
      • 确保视频/图片清晰,覆盖需要监测的区域
    2. 获取 open-id(强制执行)
      • 按上述流程控制获取 open-id
      • 如无法获取,必须提示用户提供用户名或手机号
    3. 执行风险分析
      • 调用 -m scripts.risk_analysis 处理输入源
      • 参数说明:
        • --input: 本地文件路径(与--url二选一)
        • --url: 网络URL或实时流地址(与--input二选一)
        • --open-id: 当前用户的 open-id(必填,按上述流程获取)
        • --list: 列出该 open-id 的历史风险分析报告(与--input/--url互斥)
        • --page-num: 分页页码,配合--list使用(默认 1)
        • --page-size: 分页大小,配合--list使用(默认 30)
        • --api-key: API访问密钥(可选)
        • --api-url: API服务地址(可选,使用默认值)
        • --mode: 分析模式(all/fall/health/behavior,默认all)
        • --threshold: 预警阈值(0.1-1.0,默认0.8)
        • --output: 结果输出文件路径(可选)
        • --alert: 是否开启自动预警(true/false,默认false)
    4. 获取分析结果
      • 结构化的风险分析报告
      • 包含:风险类型、置信度、发生时间、位置信息、预警等级、处理建议
      • 高风险事件自动触发预警通知

资源索引

注意事项

  • 仅在需要时读取参考文档,保持上下文简洁
  • 支持格式:mp4/avi/mov/jpg/png/rtsp/http/https
  • 最大支持视频大小:200MB
  • 分析结果仅供参考,不能替代专业安防和医疗诊断
  • 高风险事件会自动记录到日志目录
  • 实时流分析支持持续监测,检测到风险立即触发预警

使用示例

# 分析本地视频文件
python -m scripts.risk_analysis --input /path/to/video.mp4 --open-id your-open-id

# 分析网络视频URL
python -m scripts.risk_analysis --url https://example.com/video.mp4 --open-id your-open-id

# 跌倒识别模式(只检测跌倒事件)
python -m scripts.risk_analysis --input video.mp4 --open-id your-open-id --mode fall

# 实时流监测(RTSP摄像头)
python -m scripts.risk_analysis --url rtsp://camera_ip:554/stream --open-id your-open-id --alert true

# 自定义预警阈值
python -m scripts.risk_analysis --input video.mp4 --open-id your-open-id --threshold 0.7

# 保存结果到文件
python -m scripts.risk_analysis --input video.mp4 --open-id your-open-id --output result.json

# 📋 列出指定用户的历史风险分析报告
python -m scripts.risk_analysis --list --open-id your-open-id

# 列出指定用户的历史报告,自定义分页
python -m scripts.risk_analysis --list --open-id your-open-id --page-num 2 --page-size 20

风险类型说明

  1. 跌倒风险(fall):识别人员跌倒事件,置信度>0.8触发高等级预警
  2. 健康风险(health):识别心梗/脑梗前兆、突发疾病症状等
  3. 异常行为(behavior):识别剧烈运动、长时间静止、闯入等异常行为
  4. 综合模式(all):同时检测所有类型风险

预警等级

  • 高风险(红色):置信度>0.9,立即触发报警
  • 中风险(黄色):置信度0.7-0.9,记录并关注
  • 低风险(蓝色):置信度0.5-0.7,仅记录日志

Comments

Loading comments...