Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

PathClaw

v1.0.2

使用华银康集团 PathClaw 对病理切片进行泛癌预测。具体流程包括:运行病理切片诊断,包括:(1)从登录 API 获取认证 token;(2)使用 slide_file 启动诊断任务;(3)获取诊断结果。触发短语:"病理切片诊断"、"pathology diagnosis"、"PathClaw"等。**注意*...

0· 41·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the instructions (login → upload .svs → poll results). No declared credentials or env vars are required, which aligns with the instruction that the agent obtains a token from the service. However the target is a raw IP (http://119.91.47.20:8111) with no hostname, no HTTPS, and the package has no homepage or source provenance; that makes it hard to verify that the endpoint belongs to the claimed vendor (华银康集团).
!
Instruction Scope
The SKILL.md explicitly instructs reading a user-supplied local file and uploading it to the remote service — this is expected for an upload-based diagnosis skill, but it also means the agent will access arbitrary file paths on the host. The instructions require multiple local file checks (existence, readability, size, extension) which are coherent, but there is no guidance about handling PHI, consent, or which metadata to remove before upload. Also the login call is shown as an unauthenticated HTTP POST with no request body specified, which is ambiguous and may cause implementations to behave unexpectedly.
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest install risk. Nothing is written to disk by an installer.
!
Credentials
No environment variables or credentials are requested, which is consistent with the workflow that obtains a token from the remote API. However, requiring no local credentials while instructing the agent to upload potentially sensitive medical images to an external HTTP IP is a privacy risk. The skill also gives no instructions about verifying the server identity or TLS, nor does it require the user to supply a trusted endpoint or API key — this lowers accountability for where data is sent.
Persistence & Privilege
always:false and no special persistence requested. The skill does not request elevated platform privileges and does not attempt to modify other skill configs.
What to consider before installing
This skill will read a local pathology slide file you provide and upload it to http://119.91.47.20:8111 over plain HTTP. Before using it, verify the endpoint actually belongs to the vendor (ask for an official domain and TLS), confirm you have patient consent to transmit the image, and prefer HTTPS. Ask the skill author how the login works (what credentials, request body) and how patient identifiers are handled or redacted. Test first with a non-sensitive dummy file. If you cannot confirm the server's identity, do not use this skill for real patient data.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cjq5pn9gah9hca0ak616srs84451x

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments