Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Discord Bot

v1.0.0

Discord Bot API integration — manage servers, channels, messages, roles, members, and webhooks via the Discord REST API. Send messages, manage server setting...

0· 511·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill name/description (Discord bot management) aligns with the code’s intent (HTTP calls to discord.com). However the actual HTTP paths and methods in the script are incorrect/implausible for the real Discord REST API (e.g., using endpoints like /guild/get, /channel/create, /message/edit instead of Discord’s documented endpoints), and the script uses Authorization: Bearer <token> while Discord bot tokens require the Authorization: Bot <token> header. These mismatches mean the script likely will not function as advertised and raise concerns about correctness.
!
Instruction Scope
SKILL.md states 'never stores data locally' and declares only DISCORD_BOT_TOKEN as required, but the runtime script attempts to read an .env file from a workspace path (constructed from WORKSPACE or ~/.openclaw/workspace/.env) if the environment variable is absent. Reading files from the user home/workspace is outside what the skill declares and is unexpected scope creep. The SKILL.md instructions do not mention this fallback behavior.
Install Mechanism
This is instruction-only with an included Python script and no install spec — nothing is automatically downloaded or written to disk by an installer. Risk from install mechanism itself is low.
!
Credentials
The declared required credential (DISCORD_BOT_TOKEN) is appropriate. However the script also reads a WORKSPACE environment variable (not declared) to form a path to an .env file in the user's home (~/.openclaw/workspace/.env), which could access other secrets or files. The undocumented file-read fallback is disproportionate and should be disclosed or removed.
Persistence & Privilege
The skill does not request permanent presence (always is false) and does not modify other skills or system-wide settings. No elevated persistence privileges are requested.
What to consider before installing
This skill is internally inconsistent and should be reviewed/fixed before you provide a real bot token or run it in a production environment. Specific points to consider: - Do not supply your production DISCORD_BOT_TOKEN until the script is fixed and reviewed. Use a test bot with minimal permissions for experiments. - Code issues to fix or verify: change Authorization header to 'Bot <token>' (not 'Bearer'), and update the HTTP endpoints and methods to match Discord's documented API (e.g., POST /guilds/{guild.id}/channels to create channels, etc.). Many functions currently call nonstandard paths and HTTP verbs and will fail or behave unpredictably. - The script will try to read ~/.openclaw/workspace/.env (or a WORKSPACE-specified path) if DISCORD_BOT_TOKEN isn't set. This file-read is not declared in SKILL.md — consider removing this fallback or documenting it, since it can access arbitrary files in your home/workspace. - Because the implementation appears buggy, run the CLI in an isolated environment (sandbox/container) and with a test bot account to observe actual network requests. Inspect and/or instrument the script (or run it under a network debugger) to confirm which endpoints it calls. - If you are the maintainer or plan to use this skill, request an updated version from the author that fixes the Authorization header, corrects endpoints/methods, removes undocumented file reads, and documents behavior explicitly. If the author provides a corrected version, re-evaluate; if they explain the odd endpoints are placeholders or proxies and provide secure justification, that could change this assessment. Confidence is medium: the issues look like sloppy/incorrect implementation rather than clearly malicious intent, but the undocumented file access and protocol errors justify caution.

Like a lobster shell, security has layers — review code before you run it.

latestvk97f7en9h6b8hb2h6cb847y6r1827hdg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🤖 Clawdis
EnvDISCORD_BOT_TOKEN
Primary envDISCORD_BOT_TOKEN

Comments