小红书自动化 V2
Analysis
This is a disclosed Xiaohongshu automation bot, but it can log in, persist your session, bypass platform detection, and publish or interact publicly from your account.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
内容发布 - 图文发布、视频发布、长文发布 ... 社交互动 - 评论、回复、点赞、收藏 ... 反检测机制 - 模拟真实用户行为,绕过平台检测
The skill explicitly enables public posting and social engagement from a logged-in account and includes behavior intended to bypass platform automation detection.
args = [chrome_bin, f"--remote-debugging-port={port}", f"--user-data-dir={user_data_dir}", *STEALTH_ARGS] ... subprocess.Popen(args, ...)The skill starts a local Chrome process with a CDP debugging port and a persistent user-data directory; this is expected for the stated CDP automation purpose but expands the local browser control surface.
依赖 - Python 3.10+ - Google Chrome 120+ - 见 `requirements.txt`
The artifact references requirements.txt, but the manifest does not include that file and there is no install spec, leaving dependency versions/pins unclear.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
认证登录 - 二维码登录、手机号验证码登录 ... Cookie 持久化 - 登录状态自动保存,下次免登录
The skill uses authenticated Xiaohongshu sessions and persists login state, while the registry metadata declares no primary credential or required config path.
