Back to skill
Skillv2.1.0
ClawScan security
小红书笔记批量下载 · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 26, 2026, 2:16 PM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's requirements and runtime instructions align with its stated purpose (automating downloads from a logged-in Chrome session via the DevTools Protocol); nothing requested is disproportionate, but it does require access to your local Chrome debugging port and will read in-page JS state so review before use.
- Guidance
- This script is coherent with its stated goal but connects to your local Chrome debugging port and runs JavaScript inside the browser context — it therefore can access anything available in that browser session (including tokens and page data). Before running: (1) inspect the Python code yourself (or run it in a disposable profile) to ensure it only extracts content you expect; (2) avoid running while your primary browser profile (with other accounts) is exposed; (3) don't enable remote debugging on a machine/network you don't control; (4) confirm the download of content complies with Xiaohongshu's terms; and (5) run with least privilege (don't run as root). If you want stronger isolation, create a separate Chrome profile, sign into only the target account there, and enable remote debugging on that profile only.
Review Dimensions
- Purpose & Capability
- okThe skill says it will automate downloads from Xiaohongshu using Chrome DevTools Protocol and the SKILL.md instructs exactly that: connecting to localhost:9222, targeting a Chrome tab, evaluating DOM/JS and downloading images and text. Required inputs (profile_id, tab_id, save directory) and recommended Python packages are coherent with that purpose.
- Instruction Scope
- okInstructions are focused on controlling a local Chrome tab via CDP, extracting DOM nodes and window.__INITIAL_STATE__, and downloading images/text. Accessing in-page JS state (xsecToken) is necessary for constructing detail URLs but is also capable of exposing other in-page/session data — the script as provided only uses it for tokens and content extraction.
- Install Mechanism
- okThis is instruction-only (no install spec). The README recommends pip installing websocket-client and requests, which is proportionate and typical for running the provided Python script. No external archive downloads or execution of fetched code are instructed.
- Credentials
- okNo environment variables or external credentials are requested. The script intentionally requires an already-logged-in Chrome instance with remote debugging enabled because it leverages the browser session; that access is proportional to the claimed functionality but has privacy implications (it can read data available to the browser).
- Persistence & Privilege
- okThe skill is not always-enabled and does not request persistent system privileges or modify other skills/config. It runs a one-off Python script against a user-specified Chrome debugging endpoint, which is appropriate for the task.
