Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Html Slideshow

v2.0.3

将Markdown演示大纲转换为HTML静态幻灯片,自动分页、理解布局规划、生成对应HTML结构

0· 101·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description require Node and scripts to parse Markdown and generate HTML — the included Node scripts, layout analyzer, split/generate scripts, templates and themes align with the stated purpose. No unrelated credentials, binaries, or external services are requested.
!
Instruction Scope
Runtime instructions tell the agent to run included Node scripts that read a Markdown file and write HTML files (expected). However: (1) the SKILL.md examples use a hard-coded absolute path (/home/Vincent/.openclaw/...) which is odd and may cause the agent to reference an environment-specific path; (2) multiple generate scripts explicitly state they do not escape or sanitize input (e.g. 'Don't escape - marked will render correctly, HTML is allowed'), meaning user-provided Markdown can inject raw HTML and <script> tags into produced slides — this increases XSS/exfiltration risk when opening generated HTML; (3) templates and the component registry render client-side <script> blocks (registry.chart injects <script> new Chart(...)), so generated output can execute arbitrary JS in the viewer's browser. These behaviors are within a slide generator's domain but are high-risk when processing untrusted input.
Install Mechanism
This is instruction-only with code files bundled in the skill (no external install/download). Required runtime is only Node.js. No remote downloads or URL-based installers were observed in the provided files.
Credentials
No environment variables, credentials, or unrelated config paths are requested. The scripts read user-supplied input/output paths and create local output/themes directories which is proportional to the skill's purpose.
Persistence & Privilege
The skill does not request always:true and does not modify other skills. It writes files to provided output folders and may create a themes/ directory under the skill location — behaviour expected for a generator. Model invocation is not disabled (normal).
What to consider before installing
This skill is functionally coherent for converting Markdown into static HTML slides, but follow these precautions before running it: - Treat input markdown as potentially dangerous: the generator intentionally allows raw HTML and script tags (the code comments say 'Don't escape - marked will render correctly, HTML is allowed'). Only run the scripts on trusted Markdown or sanitize/strip HTML before processing. Opening generated HTML in a browser will execute any embedded scripts. - Review and audit templates and any custom themes you load. The template compiler uses dynamic code generation (new Function) to build renderers; if you or others add templates untrusted templates could execute code during generation. - The SKILL.md examples include a hard-coded absolute path (/home/Vincent/...), which is likely an environment artifact. When running, point the scripts at your own safe input and output directories — avoid blindly running commands copied verbatim from the README/SKILL.md. - Run the tool in an isolated environment (container or VM) if you need to process Markdown from untrusted sources, and inspect the produced HTML before serving it to others. Consider adding an HTML sanitizer (e.g., DOMPurify on the client or a server-side sanitizer) if you must accept untrusted input. - If you expect this to run autonomously in an agent, be cautious: the agent could read local files you point it at and write HTML that will execute in browsers — only give it directories and files you are comfortable exposing. If you want, I can point out the exact lines/files that allow raw HTML/script injection and show small code changes to mitigate the risk (e.g., sanitize output or disable inline scripts).
scripts/template-compiler.js:28
Dynamic code execution detected.
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk978rhd4gb6e6rvj5ctjdkb12d83sdps

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🖥️ Clawdis
Binsnode

Comments