Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Creator Intel V5
v1.0.0创造者情报 V5 - 工程师视角技术情报聚合器 严禁 VC 商业化话术,只关注底层技术实现。 服务对象:硬科技工程师、极客产品经理、技术研究者。 核心选品标准(按优先级): 1. 🥇 GitHub 开源项目与霸榜(新模型、新硬件图纸、开发工具库) 2. 🥈 硬核技术原理解析(MoE、稀疏注意力、流匹配、新架构) 3. 🥉 极客硬件与创新交互(ESP32、树莓派、Kickstarter 创意硬件) 摘要必须包含: - 至少 2 个技术名词或具体参数 - 架构/算法/材料/性能指标 - 严禁:"拓展商业化"、"规模化部署"、"生态布局" 等公关套话 信源分布: - 国际:GitHub、IEEE、arXiv、Kickstarter、Hackaday(Tavily API 搜索) - 国内:机器之心、量子位、开源中国 RSS 使用场景: - "生成今日技术情报" - "有什么硬核技术新闻" - "GitHub 上有啥新东西" 输出格式: ``` [YYYY-MM-DD] 创造者情报 🌍 📦 [技术实体 + 动作 + 性能参数](URL) 摘要:架构细节;关键性能指标;应用场景 ⚛️ [技术实体 + 动作 + 性能参数](URL) 摘要:... ```
⭐ 0· 917·0 current·0 all-time
by@uuoov
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (engineering-focused tech intelligence) match the code and instructions: the skill fetches RSS feeds and queries a search API to assemble short technical briefs. That capability is coherent with the stated purpose.
Instruction Scope
SKILL.md instructs editing and running scripts/generate_intel.py and setting TAVILY_API_KEY inside that file, but the repository contains scripts/generate_brief.py (filename mismatch). The instructions also rely on an external Tavily search API and require placing an API key into the script — the behavior includes network calls to third-party services and writes a history file to ~/.openclaw/creator-intel/history.json. The undocumented hardcoded key in the code (see below) and the filename mismatch are scope/instruction inconsistencies.
Install Mechanism
There is no install spec (instruction-only style) and dependencies are ordinary (feedparser, requests). No downloads from untrusted URLs or archive extraction are present in the manifest — install risk is low.
Credentials
The skill uses a Tavily API key (TAVILY_API_KEY) embedded in the script but the skill metadata declares no required environment variables or primary credential. Requiring an API key for an external search service is reasonable, but the credential is not declared and is hardcoded in the code — this is disproportionate/incoherent with the declared requirements and risks accidental credential leakage or misuse.
Persistence & Privilege
The script persists history to ~/.openclaw/creator-intel/history.json (recent 500 items) — this is within normal behavior for an aggregator. The skill is not marked always:true and does not request system-wide privileges. Autonomous invocation is allowed by default (platform default), which is expected for skills but increases blast radius when combined with the other concerns above.
What to consider before installing
What to consider before installing:
- Filename mismatch: SKILL.md refers to scripts/generate_intel.py but the repository provides scripts/generate_brief.py. Ask the author to confirm which script is authoritative and provide a matching README or corrected files.
- Hardcoded API key: the Python file contains a hardcoded TAVILY_API_KEY value. Treat this as suspicious until you verify its origin. Do not assume it is safe — it may be a disposable/dev key or someone else's credential. Prefer that the skill read the API key from an environment variable (declared in the skill metadata) rather than embedding it in code.
- Undeclared credential: the skill metadata lists no required env vars, but the code calls an external API with a key. Ask the author to declare required credentials so you can manage/rotate them properly.
- Network behavior: the skill makes POST requests to api.tavily.com and fetches RSS feeds. If you plan to run this skill, run it in a restricted environment or sandbox and monitor outbound connections until you confirm expected behavior.
- Storage: the skill writes history to ~/.openclaw/creator-intel/history.json. If that is sensitive in your environment, run with a different HOME or modify the path.
Recommended actions:
1) Request corrected files and an explanation of the hardcoded key from the publisher.
2) Refuse to use the embedded key; configure your own Tavily API key via an env var and ask the author to update the code to read from the env var (and update skill metadata to require it).
3) If you already used the embedded key, consider it compromised and rotate it with the Tavily service.
4) Run the skill first in a sandboxed account and monitor network calls and created files.
Confidence note: medium — the behavior fits a news-aggregator, but the metadata/code inconsistencies and embedded credential are clear red flags that warrant verification before trusting or enabling autonomous runs.Like a lobster shell, security has layers — review code before you run it.
latestvk9704f780w2swd1na3jrbf0p6h80yg6c
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
