Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Design With Hopola
v1.0.9Runs web research and orchestrates image/video/3D generation, logo and product visuals, upload, and Markdown reporting. Use when users need an end-to-end mul...
⭐ 0· 118·0 current·0 all-time
by@typisin
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name and description (web research → generation → upload → report) align with the included SKILL.md, subskills, and scripts. The declared runtime behavior (discover Gateway tools, call generation tools, run upload subprocess) is coherent with the stated purpose. However the registry-level summary at the top of the package metadata lists no required env vars / credentials / permissions while SKILL.md and scripts explicitly declare/expect OPENCLOW_KEY and require network:http and local_file:read — this metadata mismatch is noteworthy and could mislead users who only inspect registry fields.
Instruction Scope
SKILL.md and subskills explicitly instruct the agent to perform web searches (web-access), call Gateway endpoints (hopola.ai) with X-OpenClaw-Key, and to read and normalize session-uploaded local files (e.g., /mnt/data/session_uploads/*) and then upload them via scripts/maat_upload.py. Those activities are within the skill's documented purpose but they grant the skill discretion to read user-supplied local files and send them to external upload endpoints — verify that only intended files are supplied and that upload policies/hosts are trusted.
Install Mechanism
There is no install spec (instruction-only from an install perspective). The package includes multiple Python/Bash scripts but no remote download/extract or third-party installation steps. That reduces installation risk compared to arbitrary download/install steps. Still review the included scripts (maat_upload.py) since they will be executed by the agent runtime when upload is invoked.
Credentials
SKILL.md and README files require OPENCLOW_KEY for Gateway calls and reference MAAT_TOKEN_API (and legacy env names) plus MAAT_TOKEN_API_ALLOWED_HOSTS and OPENCLAW_REQUEST_LOG. The package top-level registry metadata, however, lists no required env vars or primary credential — this mismatch is concerning because users relying on registry declarations may not realize the skill expects/uses credentials and host allowlists. The credential requests themselves are proportionate to the task (gateway key for generation calls; upload policy endpoint config for uploads), but confirm the runtime environment protects OPENCLOW_KEY and that MAAT_TOKEN_API_ALLOWED_HOSTS is set appropriately so uploads go only to trusted hosts.
Persistence & Privilege
always:false and default autonomous invocation are used (normal). The skill does not request permanent system-wide privileges in the files provided and does not attempt to modify other skills' config. It does access local session files (read) and performs network calls; these are expected for its purpose but increase blast radius if misused.
What to consider before installing
Key points to check before installing or enabling this skill:
- Metadata mismatch: The package registry shows no required env vars, but SKILL.md and scripts require OPENCLOW_KEY and request network/http and local_file:read permissions. Do not rely solely on the registry summary — inspect SKILL.md and README.
- Credential handling: OPENCLOW_KEY is needed to call hopola.ai Gateway; ensure you provide a scoped key and that it is stored securely. The upload flow may call an upload policy endpoint (MAAT_TOKEN_API); set MAAT_TOKEN_API_ALLOWED_HOSTS to only trusted hosts.
- Local file access and uploads: The skill will read session/local file paths (e.g., /mnt/data/session_uploads/*) and may upload them. Avoid supplying sensitive files. Review scripts/maat_upload.py to confirm what is sent to the network and that sensitive fields are redacted/logged appropriately.
- Endpoint trust: Default upload policy endpoint is https://strategy.stariidata.com/upload/policy — if you override MAAT_TOKEN_API, ensure the host is whitelisted via MAAT_TOKEN_API_ALLOWED_HOSTS. Verify gateway_base_url setting and that you trust hopola.ai for generation calls.
- Audit the included scripts: maat_upload.py includes host allowlist checks and redaction logic, which is good, but you should read it and validate behavior in your environment. validate_release.py checks for plaintext keys in the repo; still ensure no keys are committed.
- If you have limited security expertise: ask the skill publisher to confirm the omitted registry declarations (required env vars and permissions), or only enable the skill in a test environment where you can control keys and sample inputs.
If you want, I can extract the exact lines where credentials/permissions are declared in SKILL.md and list the environment variables referenced in the scripts for a precise checklist to compare against your runtime environment.Like a lobster shell, security has layers — review code before you run it.
latestvk974cfj8z1d7bbfem21102gqe1846v4t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
