Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Product Promotion Email Generator
v1.0.0自动提取商品图片,生成高质量HTML推广邮件模版,支持素材库管理及邮件发送的一体化工具。
⭐ 0· 108·0 current·0 all-time
by@szzg007
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description (product image extraction → HTML email → send/save) matches the included scripts and templates. However there are surprises: code uses hard-coded user-specific file paths (/Users/zhuzhenguo/...) and an embedded SMTP account in send-email.py instead of relying on the optional env/config file described in SKILL.md. Those hard-coded artifacts are out-of-band for a broadly reusable skill.
Instruction Scope
SKILL.md describes using a 'browser' snapshot and an optional email-config.env for SMTP. The shipped scripts perform network downloads (curl), write files under a user workspace, and can send emails to arbitrary recipients. Critically SKILL.md suggests SMTP can be configured via an env file, but send-email.py contains hard-coded SMTP credentials and does not read that file — an instruction/code mismatch that could cause inadvertent use of the embedded account. The skill has the ability to fetch arbitrary URLs and send content externally, which is expected for this functionality but increases risk if credentials or endpoints are unexpected.
Install Mechanism
No install spec — instruction-only with Python scripts. That minimizes install-time risk (nothing downloaded at install). However runtime will invoke curl and smtplib to perform network operations.
Credentials
Registry metadata declares no required env vars, but SKILL.md documents an optional email-config.env and env var PRODUCT_PROMOTION_OUTPUT_DIR. The code does not read an env SMTP config; instead it embeds concrete SMTP_HOST/USER/PASS values in send-email.py. Embedding an external SMTP account and password in plaintext is disproportionate and risky. Also hard-coded file paths under another user's home are present (ASSETS_DIR, WORKSPACE).
Persistence & Privilege
always is false and the skill is user-invocable; it does not request forced/global presence. It will create and write files to the workspace/product-promotion-assets directories and metadata files — expected for an asset-management skill, but be aware it will write to the hard-coded /Users/zhuzhenguo path unless modified.
Scan Findings in Context
[hardcoded-smtp-credential] unexpected: send-email.py contains plaintext SMTP credentials (SMTP_USER and SMTP_PASS). While an email-sending capability needs SMTP info, embedding credentials in code is not expected and is unsafe — SKILL.md claims optional config but code ignores it.
[disable-ssl-verification] unexpected: send-email.py disables TLS certificate validation (context.check_hostname = False; context.verify_mode = ssl.CERT_NONE). This reduces transport security and is not appropriate for production email sending.
[hardcoded-user-paths] unexpected: Multiple scripts use hard-coded paths under /Users/zhuzhenguo/.openclaw/workspace which reduces portability and may cause the skill to read/write files in unexpected places.
What to consider before installing
This skill generally matches its stated purpose, but do NOT run it as-is. Before using: 1) Remove or rotate the embedded SMTP credentials in send-email.py and replace them with configuration read from a secure env file or secret store; do not rely on the hard-coded SMTP account. 2) Restore proper TLS verification (remove verify_mode = ssl.CERT_NONE) so connections validate certificates. 3) Change the hard-coded /Users/zhuzhenguo paths to safe, configurable paths (or set PRODUCT_PROMOTION_OUTPUT_DIR) so files don't get written into another account's directories. 4) Inspect the code paths that download images (curl/subprocess) and confirm you understand which external URLs will be contacted. 5) Test in an isolated environment and send test emails only to addresses you control. If you cannot or will not modify the code, avoid installing this skill because the embedded credentials and disabled TLS could be misused or expose your environment.Like a lobster shell, security has layers — review code before you run it.
automationvk977nddpm9hr1xa4qkma97prhs832p46emailvk977nddpm9hr1xa4qkma97prhs832p46latestvk977nddpm9hr1xa4qkma97prhs832p46marketingvk977nddpm9hr1xa4qkma97prhs832p46promotionvk977nddpm9hr1xa4qkma97prhs832p46szzg007vk977nddpm9hr1xa4qkma97prhs832p46
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
