Hwp Batch Convert
Analysis
This skill appears aligned with local Windows HWP/HWPX batch conversion, but users should notice that it can write many output files and optionally auto-click a Hancom security prompt.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`--auto-allow-dialogs`: 제목 `한글`, 본문에 `접근하려는 시도`, 버튼 `모두 허용`/`허용` 조건을 모두 만족하는 보안 팝업만 자동 클릭
The skill can automatically click a Hancom security/permission dialog. This is clearly disclosed and constrained by a whitelist, but it bypasses a human confirmation step when enabled.
`--include-sub`: 하위 폴더 포함(기본값) ... `--overwrite`: 같은 이름 출력 허용 ... 먼저 `--plan-only --json` 으로 대상/건너뜀/출력 경로를 확인한다.
The skill is designed for recursive batch conversion and can optionally overwrite outputs. The plan-only step helps contain mistakes, but a wrong folder or overwrite choice could affect many files.
OS restriction: none; Required binaries: none; Required env vars: none; No install spec
The registry metadata does not encode the Windows/Hancom/pywin32 runtime assumptions that the SKILL.md documents. This is an under-declared environment requirement rather than hidden behavior.
