Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Xiaoqian
v1.0.3自动登录江苏海事局综合平台查询指定日期范围内的全局会议信息并导出包含时间、地点和参会人员的结构化数据。
⭐ 0· 120·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description and the provided Python automation code align: the code automates login to the listed portal and scrapes meeting data. However, provenance is unclear (source/homepage unknown) and the package embeds a specific account (lp@njmsa / @lp280033) in SKILL.md and as defaults in code, which is unexpected for a general-purpose skill and raises questions about origin and intended operator.
Instruction Scope
SKILL.md and the script remain within the stated task (navigate site, query meetings, export Excel). But the instructions/code include plaintext credentials, will download Chrome WebDriver at runtime, write logs and output files, and the script deliberately attempts to evade automation detection (overriding navigator.webdriver). Those behaviors broaden the runtime footprint beyond a simple read-only query.
Install Mechanism
There is no declared install spec (instruction-only), but the Python code uses webdriver-manager to download ChromeDriver at runtime. webdriver-manager is a common tool and fetches drivers from standard sources, but runtime binary download increases network activity and introduces supply-chain risk compared with a pure instruction-only skill.
Credentials
The skill requests no required env vars in its metadata, yet the code reads MSA_USERNAME and MSA_PASSWORD (with insecure defaults embedded). SKILL.md even prints default credentials. Requiring credentials is reasonable for a login automation tool, but embedding real-seeming credentials and failing to declare them is a coherence/security problem and could leak secrets or encourage misuse.
Persistence & Privilege
The skill is not marked always:true and does not request elevated platform privileges. It writes logs and generates Excel files in the working directory (expected). Autonomous invocation is allowed by default (normal) but does increase blast radius when combined with the credential/evade flags above.
What to consider before installing
This skill mostly does what it says (automates login and scraping of the Jiangsu MSA portal), but exercise caution before installing: 1) The SKILL.md and code include plaintext default credentials — do NOT use these defaults; treat them as potential leaked/stale credentials and rotate any affected account. 2) The code expects MSA_USERNAME/MSA_PASSWORD but the skill metadata does not declare required env vars — if you install, set those env vars yourself rather than relying on defaults. 3) The script downloads ChromeDriver at runtime and attempts to hide automation (navigator.webdriver override), which increases network and detection-evasion behavior; run it in a controlled sandbox or VM and review network activity. 4) Verify the skill's provenance (who published it) before giving it access to credentials or your network. If you cannot confirm origin or do not want the script to handle credentials, do not install/run it; alternatively, extract and review the script first, remove hard-coded defaults, and supply credentials via secure environment variables or a secrets manager.Like a lobster shell, security has layers — review code before you run it.
latestvk979yczfkcnync5y702kmhxhhx838jb7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
