诈骗电话识别分析工具

ReviewAudited by ClawScan on May 13, 2026.

Overview

The skill mostly matches its fraud-call analysis purpose, but it handles sensitive call content and cloud report history using a phone/username-style open-id with unclear authentication boundaries.

Review this before installing if your calls are private. Confirm who operates the remote API, what open-id will be used, how historical reports are authorized, and how uploaded recordings are retained or deleted.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

A phone number or username may be tied to sensitive call-analysis reports and report links; if the wrong or guessable open-id is used, reports could be misattributed or exposed through the provider service.

Why it was flagged

The skill uses a username/phone-style open-id to save and query historical fraud-analysis reports, while describing API-key authentication as optional.

Skill content
必须暂停执行,明确提示用户提供用户名或手机号作为 open-id ... --list: 显示历史诈骗识别分析报告列表清单 ... API 密钥可选
Recommendation

Only use this with a provider you trust, avoid using another person's identifier, and prefer a dedicated non-sensitive account identifier. The publisher should require and document scoped authentication for report history access.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

Users may believe report access is protected by an API key or explicitly scoped open-id, but the visible wrapper does not make that boundary clear.

Why it was flagged

The wrapper accepts api_key and open_id parameters, but the shown functions do not directly use api_key and do not pass open_id into the list call; authorization/scoping appears to depend on global/common behavior not clearly shown here.

Skill content
def analyze_call(input_path=None, url=None, text=None, api_url=None, api_key=None, output_level=None):
    input_path = input_path or url or text
    return skill.get_output_analysis(input_path)

def show_analyze_list(open_id, start_time=None, end_time=None):
    output_content = skill.get_output_analysis_list()
Recommendation

Require explicit authenticated credentials for report queries, pass the user identity and API key through clearly, and document exactly how report access is authorized.

What this means

Private call recordings, call URLs, or transcripts may leave the local environment for provider-side analysis.

Why it was flagged

The skill is designed to upload user-selected call recordings or text to a remote analysis API; this is purpose-aligned but sensitive.

Skill content
`--input`: 本地音频文件路径(使用 multipart/form-data 方式上传) ... `--url`: 网络音频 URL 地址(API 服务自动下载) ... `--text`: 通话文字内容
Recommendation

Use only with call content you are comfortable sending to the provider, and avoid uploading highly sensitive recordings unless the provider's privacy terms are acceptable.

What this means

Sensitive call recordings may persist locally after analysis.

Why it was flagged

The instructions say uploaded attachments/audio are automatically stored locally under the skill directory, but retention and cleanup are not described.

Skill content
如果用户上传了附件或者音频文件,则自动保存到技能目录下 attachments
Recommendation

Check and delete the attachments directory after use if recordings are sensitive; the publisher should document retention and cleanup behavior.

What this means

If the environment were switched to dev, requests could be sent to a private or unexpected endpoint.

Why it was flagged

A bundled development configuration points to a private raw-IP endpoint. The default config appears to use prod, so this is not clearly active by default, but it is a provenance/configuration risk to notice.

Skill content
base-url-open-api: "http://192.168.1.234:9601/smyx-open-api"
Recommendation

Do not enable dev configuration unless you control that endpoint; the publisher should remove private dev endpoints from released packages.