Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Affiliate Skills
v1.0.0Live affiliate program data from list.affitor.com. Search programs, compare commissions, check cookie days, find top performers. Use when researching affilia...
⭐ 0· 140·0 current·0 all-time
by@sonpiaz
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (live affiliate program data from list.affitor.com) match the included API.md, CLI tool sources (tools/src), and many SKILL.md files for affiliate-focused functions. No unrelated cloud credentials or unrelated binaries are requested.
Instruction Scope
Runtime instructions tell the agent to check for a local compiled binary, ask the user to permit a one-time build (./setup), and then run a persistent Bun-based daemon that uses /tmp/affiliate-check.json and listens on localhost ports 9500–9510. These actions are within scope for a CLI helper, but they involve executing local build and server commands and creating a state file in /tmp — review the setup script and CLI source before running.
Install Mechanism
Registry lists no formal install spec, but SKILL.md's setup step may run './setup' and, if Bun is missing, suggests running 'curl -fsSL https://bun.sh/install | bash'. Piping remote install scripts is a high-risk pattern; while bun.sh is a known runtime, executing an unattended remote installer should be treated cautiously and inspected first.
Credentials
No required environment variables are declared; SKILL.md documents an optional AFFITOR_API_KEY for higher API limits, and code examples use process.env.AFFITOR_API_KEY. The requested environment access is limited and proportional to the stated purpose.
Persistence & Privilege
The skill runs a local persistent daemon with an in-memory cache and a state file under /tmp and auto-shutdown after idle. 'always' is false and the skill does not request system-wide or other-skills' configuration changes. Persistent local server behavior is expected for this CLI design.
Scan Findings in Context
[prompt-injection-ignore-previous-instructions] expected: A prompt-injection pattern (e.g., 'ignore-previous-instructions') was detected in SKILL.md content. In this repo the string appears inside CLAUDE.md as a defensive rule (explicitly telling agents to ignore instruction-like text coming from untrusted API/web content). This use is expected and is a safety guideline, not an attack.
Assessment
This package appears to be what it says: a collection of affiliate-marketing skills with a small local CLI that queries list.affitor.com. Before installing or running anything: 1) Inspect the repository's setup script (./setup) and any scripts it calls; do NOT run remote installers blindly (the README/SKILL.md suggests 'curl | bash' for Bun — instead inspect the bun.sh installer or install Bun from an OS package or your preferred method). 2) Inspect the CLI source (tools/src) for any unexpected network endpoints or data-sending behavior beyond calls to list.affitor.com. 3) If you run the daemon, be aware it listens on localhost and writes /tmp/affiliate-check.json; run it in a confined environment (container or VM) if you're cautious. 4) Only provide AFFITOR_API_KEY if you trust the code; it is optional and only needed for higher query limits. 5) If you plan to let an agent autonomously invoke the 'Bash' allowed-tool, understand that gives it permission to run the same build/run commands described here — require user approval before performing the one-time build/run step.tools/src/cli.ts:80
Environment variable access combined with network send.
tools/src/server.ts:26
Environment variable access combined with network send.
tools/src/cli.ts:33
File read combined with network send (possible exfiltration).
CLAUDE.md:48
Prompt-injection style instruction pattern detected.
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97e37kqbwm7s2dzg35ryfp0v1832pk4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
