Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Google Research Pro

v1.0.0

Performs advanced Google searches with Playwright for OpenClaw technical resources and summarizes results for Telegram channel delivery in Markdown format.

0· 56·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The declared purpose (Playwright-driven Google searches + Telegram summaries) is plausible, but the skill metadata lists no code, no install steps, and no required environment variables. The SKILL.md expects a local Python script at C:\Users\Admin\OneDrive\Desktop\LearnOpCL\bot.py which is not provided by the skill bundle — that is incoherent with an instruction-only skill published with no code.
!
Instruction Scope
Runtime instructions explicitly tell the agent to execute a local Python script using an absolute path and working directory (OneDrive path). That script would run with the agent's privileges, can access local files and network, and is not included in the skill. The instructions also describe using Playwright to 'bypass bot detection' (techniques that could violate service terms) and to send messages to a Telegram channel, but do not declare or require the Telegram token/chat ID in the metadata.
Install Mechanism
No install spec is provided (instruction-only), which is low-risk in itself. However SKILL.md requires Playwright and its browser installs (playwright install) and a local bot.py — the absence of an install section means the skill assumes local setup that isn't managed or described by the skill bundle.
!
Credentials
The skill will need sensitive credentials (e.g., Telegram bot token and channel ID) and possibly Google account credentials or proxies, but requires.env is empty and no primary credential is declared. This mismatch means the skill asks the agent to handle secrets without declaring them, and instructs executing an external script that could itself access any environment variables or secrets on the host.
!
Persistence & Privilege
The skill does not request persistent always:true, which is good, but its runtime instructions require executing arbitrary local code (bot.py) from the user's OneDrive path. That grants the executed code full runtime privileges and potential access to user files and networks — a high-privilege action that is not reflected in the skill metadata.
What to consider before installing
Do not install or run this skill until you verify the missing pieces. Specifically: (1) ask the publisher for the bot.py source (the skill currently points to C:\Users\Admin\OneDrive\Desktop\LearnOpCL\bot.py but does not include it); review that code line-by-line before executing it. (2) Require the skill to declare any required environment variables (e.g., TELEGRAM_BOT_TOKEN, TELEGRAM_CHAT_ID) in metadata and confirm where they will be stored. (3) Understand Playwright/browser installation needs and run them in a sandboxed environment; avoid running scripts that claim to 'bypass bot detection' because that may violate Google terms and could be used for abusive scraping. (4) If you must test, run the referenced bot.py in an isolated VM/container with no access to your real secrets or personal files, and monitor network activity. If the author cannot provide the missing code and a clear explanation for why credentials aren't declared, do not trust this skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bv2p5r87qy6bnah6zx6f56d83fabr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments