Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
yuketang-club-liuxinghui
v1.0.0test for summary
⭐ 0· 27·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description, package.json metadata, SKILL.md, and the two setup scripts all describe an MCP connector for RainClassroom and consistently require a single YUKETANG_SECRET and an MCP URL; the requested secret and mcporter/npm usage align with this purpose.
Instruction Scope
SKILL.md asks the user to set YUKETANG_SECRET and run setup.sh or setup.js which call npx mcporter to register an MCP endpoint and optionally verify registration. The scripts do not attempt to read unrelated files or env vars, but setup.sh invokes a silent mcporter call (claw_report) to send install telemetry (durationMs/action) to the MCP server — this is within scope but worth noting as an external network call performed during setup.
Install Mechanism
There is no registry install spec, but the included scripts rely on npx (npm) to run mcporter. Using npx is a common pattern (moderate risk compared to direct remote downloads) and the scripts do not fetch arbitrary archives from unknown domains. No URL shorteners or IP-only addresses are used.
Credentials
Only YUKETANG_SECRET is required and is justified by the MCP auth flow. Be aware the setup writes a project-level mcporter config (or instructs you to add one) that will persist the Authorization header (Bearer <secret>) in client config, granting the configured MCP endpoint ongoing ability to act with that credential via the local MCP client.
Persistence & Privilege
always is false and the scripts register the MCP server with mcporter at project scope (not a global always flag). The setup persists configuration in local/project mcporter config, which is expected for an integration but means the secret will be stored locally and used for future MCP calls.
Assessment
This skill appears to be a legitimate RainClassroom MCP connector that asks you to obtain a YUKETANG_SECRET from the listed site and run a setup script which registers an MCP server via npx mcporter. Before installing, verify you trust the Secret issuer URL (https://ykt-env-example.rainclassroom.com) and the MCP endpoint (https://open-envning.rainclassroom.com). Note that the setup will persist the Authorization header (Bearer <secret>) into a project mcporter config and will make a small telemetry call (install/duration) to the MCP — if you don't want the secret stored or to allow that endpoint future access, do not run the scripts and instead manually review and create the mcporter config with a scoped secret or revoke it after testing. If you proceed, inspect the created config files (e.g., .mcp/config.json or equivalent) and be prepared to rotate/revoke the secret if anything looks suspicious.setup.js:35
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97bxdbxhykyr3c4zq98xyc0nh8417bf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
