Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

web-test-reporter

v1.0.0

Web功能测试自动化执行与报告生成。使用 agent-browser CLI 对 Web 系统进行完备的功能测试,并生成标准 Word (.docx) 测试报告。激活时机:(1) 用户要求测试某个页面或模块的功能,(2) 用户要求生成功能测试报告,(3) 用户要求对 Web 系统做走查/验证/自动化测试。

0· 82·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name/description (web functional tests + .docx report) matches the files and instructions: SKILL.md defines test steps and there is a report-generation script. However SKILL.md mandates use of an external CLI 'agent-browser' and the Python dependency python-docx, yet the skill metadata lists no required binaries or dependencies — a mismatch that could cause runtime surprises.
!
Instruction Scope
Instructions explicitly ask the agent to: request project code paths and then '通读' (read) source code; request login credentials (tenant/username/password) if needed; drive the web UI via agent-browser and take many screenshots; and clean up test data. Reading arbitrary project code and collecting credentials are legitimately part of deeper testing but are sensitive actions. The SKILL.md does not place limits (e.g., prefer test accounts, avoid production secrets) nor does it declare how collected credentials are stored/used.
Install Mechanism
This is an instruction-only skill (no install spec), which is low risk. The included Python script notes the dependency 'python-docx' but the skill metadata doesn't declare dependencies. No network downloads or obscure URLs are present in the package.
!
Credentials
The skill declares no environment variables or credentials, yet the runtime instructions will prompt for sensitive items (login credentials and local code paths). The provided script hard-codes a Windows path (C:\Users\liuchao25\.openclaw\workspace\reports\...) which suggests leftover user-specific configuration and could cause writes to unexpected locations if not edited — this is disproportionate and should be corrected before running.
Persistence & Privilege
The skill is not always-enabled, does not request persistent system-wide changes, and contains no install hooks. It writes files only to a report directory (as defined in the script) and does not attempt to modify other skills or global agent settings.
What to consider before installing
This skill appears to implement the described testing and report-generation workflow, but review these points before installing or running it: 1) The SKILL.md expects the agent-browser CLI and the Python package python-docx, but the skill metadata did not declare required binaries/dependencies — ensure you have a trusted agent-browser binary installed and run 'pip install python-docx' in a controlled environment. 2) The instructions will ask you to provide project code paths and login credentials; never supply production credentials. Prefer a dedicated test account or sandbox environment and avoid giving broad access to source trees you don't trust. 3) Edit the build_report.py defaults (BASE and OUT) before running — it currently contains a hard-coded Windows user path (C:\Users\liuchao25...) that may be irrelevant or stale and could cause files to be written to unintended locations. 4) Confirm the agent-browser tool you use is trustworthy (it will control a browser and can interact with your application). 5) If you must provide source code for white-box testing, limit scope to the intended module and avoid uploading secrets; review code you give the agent for sensitive config or keys. 6) Run testing in an isolated environment (VM/container) where possible, and verify that the skill cleans up test data as promised. If you want higher assurance, ask the publisher for: a) a declared dependency list (agent-browser, python packages), b) confirmation the agent will not transmit credentials off-host, and c) a cleaned/parameterized build_report.py without hard-coded user paths.

Like a lobster shell, security has layers — review code before you run it.

latestvk973w1rv0ctg93ssjjnfqrefw583q8bj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments