Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
iClick Automation
v0.1.0爱触云(iClick)IOS免越狱自动化技能,提供设备监控、设备状态检查、RPA自动化等功能
⭐ 0· 280·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (iClick iOS automation) align with the bundled code: there is a local Node server (server.js), an iclick-auto dependency, and many CLI helpers for device control. However the registry metadata claims 'No install spec / instruction-only' while the package contains 87 files including node_modules and a server entrypoint — that mismatch is unexpected and should be explained by the author.
Instruction Scope
SKILL.md instructs the agent to run the bundled Node server (node {baseDir}/server.js ...) which will execute code included in the skill. It also instructs moving screenshots into ~/.openclaw/workspace and then sending them (and deleting afterward). Those filesystem operations reference a specific host path that is not declared in the skill metadata (required config paths is empty). The instructions therefore require the agent to access local filesystem and to handle potentially sensitive device data (IP, deviceName, screenshots).
Install Mechanism
No external install spec or remote download is used; all required code is bundled with the skill. That reduces the risk of fetching arbitrary remote code. The package includes standard npm modules (ws, yargs, etc.) and an iclick-auto package which is expected for this functionality.
Credentials
The skill declares no required environment variables or credentials, which is consistent with running a local Node server. However the skill exposes and returns sensitive device data (IP addresses, device names, screenshots) and provides device file deletion and file-transfer capabilities (saveMediaFile, delMediaFile, clearMediaFile). The SKILL.md claims 'do not proactively leak' such data, but the API semantics inherently surface these sensitive items — the skill does not declare or restrict access to them in metadata (no required config paths or disclaimers).
Persistence & Privilege
Skill flags are normal: always:false and disable-model-invocation:false (normal autonomous invocation is allowed). The skill does not request to persist itself across agents or to modify other skills' configs in the manifest. No elevated platform-wide privileges are declared.
Scan Findings in Context
[pre-scan-none-detected] expected: The provided static pre-scan reported no injection signatures. That does not imply safety: the package bundles executable server.js and many node modules which can perform network and filesystem operations; absence of regex findings is not sufficient to rule out misuse.
What to consider before installing
What to consider before installing:
- Source and provenance: the skill has no homepage and an unknown owner. Prefer skills with a clear upstream repo or vendor and a reviewable origin.
- Local code execution: installing this skill will run a bundled Node server (server.js) when invoked. Review server.js and util/iclick.js to see which network endpoints it contacts, whether it listens on local/remote ports, and whether it logs or transmits device data externally.
- Sensitive data access: the skill returns device IPs, names and screenshots and can delete or save media on devices. Only use it in a trusted, isolated environment and avoid giving it access to sensitive devices or networks until you audit the code.
- Filesystem paths: the SKILL.md instructs moving temporary screenshots into ~/.openclaw/workspace — that path was not declared in metadata. Expect the skill to read/write local files; run it in a sandbox or container.
- Testing recommendations: run the skill in an isolated VM/container with no network access first, inspect network activity (outbound connections), and search server.js for remote hostnames/URLs and for any use of child_process or direct network sockets.
- If you cannot audit the server.js source or host the code yourself, consider declining or requesting the author provide a trusted upstream (GitHub repo, official vendor) and a rationale for bundling the node_modules.
I have medium confidence because the manifest and SKILL.md are available and getScreenShot implementation is visible, but the full server.js and util/iclick.js code (entrypoint behaviours and any external endpoints) were not fully shown in the scanned summary — reviewing those files would raise confidence either way.node_modules/.pnpm/yargs-parser@22.0.0/node_modules/yargs-parser/package.json:24
Install source points to URL shortener or raw IP.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.Like a lobster shell, security has layers — review code before you run it.
latestvk970vsytnamtkqbd6gpdy9f4m582mqwk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binsnode
