xiaoyuzhou-asr
Analysis
The skill appears to do the advertised local podcast transcription, but it relies on Xiaoyuzhou account tokens and third-party local tools that users should trust before use.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
git clone https://github.com/ultrazg/xyz.git && cd xyz && go run . ... git clone https://github.com/alan890104/qwen3-asr-rs.git && cd qwen3-asr-rs
Setup depends on running/building external repositories without pinned commits or checksums. This is disclosed and aligned with the skill's purpose, but it is a supply-chain trust point.
cmd = ["ffmpeg", "-y", "-i", str(input_path), ...]; subprocess.run(cmd, capture_output=True, text=True)
The script invokes local binaries such as ffmpeg/ffprobe and the configured ASR executable. This is expected for audio conversion/transcription, but it means the skill executes local tools on downloaded media.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Store in env: `XYZ_ACCESS_TOKEN`, `XYZ_REFRESH_TOKEN`; Prompt user to login if no valid token
The skill expects Xiaoyuzhou/Jike access and refresh tokens. This is needed for the stated API integration, but those credentials can access the user's account through the xyz API.
