glm-understand-image

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your GLM API key could be revealed; anyone who obtains it may be able to use your GLM account or incur charges.

Why it was flagged

The command checks for a saved API key by printing the actual key value to stdout. That can expose a billing/account credential to the agent transcript, logs, or terminal history.

Skill content
cat ~/.openclaw/config/glm.json 2>/dev/null | python3 -c "import json,sys; d=json.load(sys.stdin); print(d.get('api_key', ''))"
Recommendation

Check only whether the key exists without printing it, use a proper secret store or environment variable injection, avoid pasting keys into chat, and rotate the key if it has already been exposed.

What this means

Installing or invoking the skill may execute third-party package code on your machine.

Why it was flagged

The skill relies on npm packages executed through npx without version pinning. This is central to the MCP setup, but it means package updates or package provenance affect what code runs locally.

Skill content
npx -y mcporter --version ... --command "npx -y @z_ai/mcp-server"
Recommendation

Verify the package source against the official GLM documentation, prefer pinned versions, and run setup only in an environment where you are comfortable executing those packages.

What this means

Screenshots or images may contain private information that is sent to the GLM service for analysis.

Why it was flagged

The workflow passes a user-selected local image path or URL and a prompt to the GLM vision MCP server. This is expected for image analysis, but it means image content may be processed outside the local environment.

Skill content
mcporter call glm-vision.analyze_image prompt="<对图片的提问>" image_source="<图片路径或URL>"
Recommendation

Use only images you are allowed to share with the provider, and verify the provider’s privacy and retention terms before processing sensitive screenshots or documents.