Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
telegram-send-photo
v1.0.0Send photos via Telegram Bot API.
⭐ 0· 445·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill's name/description (send photos via Telegram Bot API) matches the code and instructions. However, the SKILL.md and the Python code include a hard-coded Bot Token, Chat ID, and a Windows-specific photo folder (D:\mimoTool\photo). A typical, well-scoped skill would ask the user to supply their own token/ID or declare them as required env vars rather than bundling a credential and fixed path.
Instruction Scope
The runtime instructions and script read image files from a local directory and POST them to Telegram. That is consistent with the stated purpose, but the provided configuration silently defines where to read images and where they will be sent. This effectively enables automatic exfiltration of local images to a third-party Telegram account unless the user explicitly replaces the defaults.
Install Mechanism
No install spec is present (instruction-only with a single Python file). That is low-risk from an installation perspective — nothing is downloaded or written during install.
Credentials
The registry metadata lists no required env vars or primary credential, yet both SKILL.md and the code include a concrete Bot Token and Chat ID. Bundling an apparent credential in the code is disproportionate and suspicious: the skill gives an external owner the ability to receive whatever images the script reads from your machine.
Persistence & Privilege
The skill does not request always: true, nor does it modify other skills or system-wide configuration. Autonomous invocation is permitted (default), which combined with the embedded credential increases risk, but the persistence/privilege request itself is not elevated.
What to consider before installing
This skill will send images from a local folder to a Telegram account. It ships with a hard-coded Bot Token and Chat ID and points to D:\mimoTool\photo by default — if you run it as-is it will upload your screenshots to that Telegram bot/chat. Before installing or running:
- Do not run this with the provided token unless you trust its owner. Treat that token as a credential giving someone else access to received files.
- Prefer replacing the hard-coded token/chat ID with your own Bot Token and Chat ID or modify the code to require them from environment variables or a prompt.
- Change the photo folder to a directory you control and verify what files exist there (or test with a harmless image first).
- Inspect the code yourself (or have someone you trust do so); the code is small and readable but contains defaults that cause data exfiltration.
- If you already ran it with the bundled token, consider those files exposed to the token owner and revoke the bot token via BotFather and/or create a new token.
Given these factors, only install/run this skill after removing or replacing the embedded credential and confirming the photo source location — otherwise treat it as potentially exfiltrative.Like a lobster shell, security has layers — review code before you run it.
latestvk977b7axtrdm91n7jh9mdcrs6x81tnmj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
