Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Technical Eval
v1.0.0在市场全貌清楚之后,把需要对比的技术方案并排分析,输出结构化对比和推荐结论。工作流包含:技术问题定义、全景扫描、趋势雷达、深度评估、PoC验证、风险控制、选型决策、报告生成。
⭐ 0· 68·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name, description, templates, and workflow align with a technical-evaluation purpose. However, SKILL.md/README and tavily-config.sh expect a Tavily API key and a ~/.openclaw workspace for outputs despite the registry metadata claiming no required env vars or config paths — this is an incoherence between declared requirements and actual behavior.
Instruction Scope
Runtime instructions and included script instruct the agent to (a) read ~/.openclaw/.env for TAVILY_API_KEY, (b) configure a domain whitelist and fetch multi-source data from many public domains, and (c) write analysis outputs to ~/.openclaw/workspace/tech-insight/.... Reading the user's ~/.openclaw/.env is outside the declared scope and could expose unrelated secrets if that file contains them.
Install Mechanism
There is no install spec (instruction-only + small shell script and templates). No external downloads or package installs are performed by the skill itself, which is low risk from an install-mechanism perspective.
Credentials
Although registry metadata lists no required env vars, tavily-config.sh and README require TAVILY_API_KEY stored in ~/.openclaw/.env. The script exports all non-comment lines from that file into the environment (export $(grep -v '^#' $HOME/.openclaw/.env | xargs)), which will expose any other variables in that file to the skill's process — disproportionate and potentially risky if ~/.openclaw/.env holds unrelated secrets.
Persistence & Privilege
The skill does not request always:true and does not change other skills' configs. It will write generated outputs into ~/.openclaw/workspace/... (as described in SKILL.md), which is normal for a reporting skill but should be confirmed by the user (path and file writes are not declared in the metadata).
What to consider before installing
This skill appears to implement a legitimate technical-evaluation workflow, but there are important mismatches you should address before installing or running it:
- The package metadata declares no required credentials, yet the included tavily-config.sh and README expect a TAVILY_API_KEY stored in ~/.openclaw/.env. Treat this as a required credential unless you modify the skill.
- The shell script exports every non-comment line from ~/.openclaw/.env into the environment. If that file contains other secrets (AWS keys, DB passwords, tokens), they will be injected into the skill's runtime environment. Either (a) ensure ~/.openclaw/.env contains only TAVILY_API_KEY and no other secrets, (b) modify tavily-config.sh to only read the specific variable needed in a safe way, or (c) run the skill in an isolated environment/user account.
- The skill will write reports and data to ~/.openclaw/workspace/... — confirm you are comfortable with those files being created on your machine and that file permissions are acceptable.
- Review network behavior: the workflow implies fetching data from many public domains (mlperf.org, github.com, stackoverflow.com, gartner.com, etc.). If you have network or privacy concerns, run it in a sandbox or restrict outbound access to only the sources you approve.
- If you plan to give it the TAVILY_API_KEY, prefer creating a minimal .env that contains only that key and verify tavily-config.sh (or the runtime logic) does not send that key to unknown endpoints. Consider auditing or sandboxing the skill first.
If you want, I can: (1) show a safer replacement for tavily-config.sh that only reads TAVILY_API_KEY without exporting other variables, (2) suggest a checklist to run this skill in a containerized sandbox, or (3) produce a minimal manifest update that properly declares the required env var and config paths.Like a lobster shell, security has layers — review code before you run it.
latestvk977s6w8hqjtnajk0bdz2apcxd83qpjt
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔧 Clawdis
