Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

决策简报虾 (decision-briefing-claw)

v1.0.0

每日经营数据自动汇总与简报推送助手(决策简报虾)。从多个数据源(数据库/API/Excel/飞书多维表格)采集关键业务指标,自动计算同比环比,生成结构化简报,并推送到飞书/邮件/企业微信等渠道。激活场景:(1) 需要每日自动汇总经营数据;(2) 想要定时收到业务进展简报;(3) 需要将散落在多个系统的数据整合到一...

0· 49·0 current·0 all-time
byRicky@tujinsama
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The skill's functionality (DB/API/CSV/Feishu collection and push to webhooks/email) aligns with its description. However, the skill declares no required environment variables or primary credential while the code and reference configs expect sensitive credentials (e.g., MYSQL_PASSWORD, FINANCE_API_TOKEN, Feishu webhook/token). That mismatch is disproportionate: consumers will need to provide secrets but the skill metadata does not advertise or scope them.
!
Instruction Scope
Runtime instructions instruct the agent to run included scripts that read config/data-sources.json and config/channels.json, expand environment variables inside those configs, connect to databases and external APIs, run arbitrary SQL (via the test command), and post report content to external webhooks. The SKILL.md does not explicitly enumerate the environment variables the scripts will expand or warn about arbitrary-SQL execution or external webhook destinations.
Install Mechanism
There is no install spec (instruction-only), so nothing is downloaded at install time. The included code files are small local scripts that use standard tools (python requests/sqlalchemy, jq, curl, mail). No remote install URLs or archives are used.
!
Credentials
Although the registry metadata lists no required env vars, the references and scripts expect and expand environment variables such as MYSQL_PASSWORD and FINANCE_API_TOKEN and depend on user-provided webhook tokens in config/channels.json. Requesting/using DB credentials, API tokens, and webhook URLs is expected for this capability, but the absence of declared env requirements and lack of guidance about least-privilege credentials is an incoherence and increases risk.
Persistence & Privilege
always is false and the skill only writes to its own reports/ and config/ paths per SKILL.md. It doesn't request system-wide config modification or permanent platform-level privileges. It can be scheduled (cron) as intended; that is normal.
What to consider before installing
This skill appears to implement the described reporting workflow, but be cautious before installing and running it: - Expect to provide sensitive credentials: DB passwords, API tokens, and push-webhook URLs (e.g., Feishu webhook) are read from config files and expanded from environment variables (examples in references use ${MYSQL_PASSWORD}, ${FINANCE_API_TOKEN}). The skill metadata does not declare these env vars — verify and supply only least-privilege secrets (readonly DB accounts, scoped API tokens). - Review and secure config files: config/data-sources.json and config/channels.json will contain secrets or webhook endpoints. Store them with restricted file permissions and do not put production credentials in world-readable locations. - Arbitrary SQL capability: the test subcommand executes whatever SQL you pass against the first DB in the config. Avoid running untrusted queries and prefer readonly accounts to reduce risk. - Outbound push targets: the script will POST report content to whatever webhook URL is configured. Ensure webhooks point to trusted endpoints; a malicious webhook could exfiltrate sensitive business data. - Run first in a non-production / isolated environment: validate behavior using test credentials and sample data, confirm required tools (jq, mail, curl, Python deps) and consider adding explicit metadata about required env vars before deploying broadly. - Operational recommendations: use least-privilege DB users, rotate tokens, restrict file system locations it can read (avoid mounting / or sensitive dirs), and review cron entries for who can edit them. Given the unadvertised credential use and ability to execute SQL and post data externally, treat this skill as suspicious until you audit and harden its configuration.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ah9y9c626pn1ger13xbxh4s84d9ng

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments