Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

公众号自动发布

v1.0.2

将现成的文章内容发布到微信公众号草稿箱。当用户说"发布文章"、"发布到草稿箱"、"publish to draft"、"推送到公众号"时触发。

1· 480·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description, SKILL.md, README, and scripts.sh are coherent: the skill uploads images and creates drafts via the official WeChat API (api.weixin.qq.com). However the registry metadata lists no required env vars even though the runtime clearly requires WECHAT_APPID and WECHAT_SECRET (and optionally WECHAT_AUTHOR and DEFAULT_COVER_URL). The omission in metadata is an inconsistency that reduces trust.
Instruction Scope
SKILL.md instructs the agent to source scripts.sh and call helper functions that perform network requests to WeChat APIs and write temporary JSON files under /tmp. That is within the stated purpose. Minor issues: SKILL.md says it will download DEFAULT_COVER_URL to /tmp/wechat_cover_default.png if set, but scripts.sh does not include a download helper—so either the caller or another skill must perform the download. The instructions also tell the skill not to proactively ask and to wait for parameters, which grants automation but is consistent with intended use.
Install Mechanism
This is an instruction-only skill with a small shell script; there is no installer or downloaded archive. Required runtime binaries (bash, curl, jq) are reasonable and proportional to the task.
!
Credentials
The skill requires sensitive credentials (WECHAT_APPID and WECHAT_SECRET) to call the WeChat API, which is proportionate to its function—but the registry metadata claims 'Required env vars: none', so the skill's manifest does not declare these required secrets. The README suggests adding an .env to shell init, which could expose credentials to other processes if users are not careful. No other unrelated secrets are requested.
Persistence & Privilege
The skill does not request always:true, does not modify other skills, and has no install that changes system-wide settings. README shows optional Cron usage (requires OpenClaw Gateway), which increases automation risk only if the user enables it.
What to consider before installing
This skill appears to implement a legitimate WeChat draft publisher, but there are some red flags to consider before installing: - Required credentials missing from registry metadata: The runtime script (scripts.sh) requires WECHAT_APPID and WECHAT_SECRET. The package registry incorrectly lists no required env vars—treat this as a manifest bug. Do not provide credentials until you confirm what the skill actually needs. - Credential handling: The README suggests sourcing a .env from your shell startup. If you follow that, those secrets become environment variables for your whole shell session and could be read by other processes; prefer supplying credentials scoped to the process or using a minimal isolated environment. - Network calls and endpoints: The script calls only official WeChat endpoints (api.weixin.qq.com). Verify those endpoints in your environment and ensure you expect the account that will be used. - DEFAULT_COVER_URL behavior: SKILL.md mentions downloading a default cover to /tmp if DEFAULT_COVER_URL is set, but scripts.sh doesn't implement the download—confirm who performs the download and where DEFAULT_COVER_URL points to (avoid untrusted hosts). - Automation risk: If you enable Cron to auto-run this skill, a misconfigured downstream caller could publish undesired content. Review who can trigger the skill and audit scheduled tasks. Actionable steps before use: 1) Inspect and test scripts.sh locally in a safe account (do not use production AppID/Secret) to confirm behavior. 2) Fix or request corrected registry metadata that lists WECHAT_APPID and WECHAT_SECRET as required. 3) Provide credentials using a secure mechanism (process-scoped env or secrets manager), not by globally sourcing .env in your shell rc. 4) If enabling automation (cron), restrict the triggering source and monitor activity logs in the WeChat backend. If you want, I can suggest a minimal checklist or an example of a safer invocation pattern that avoids adding secrets to your shell startup.

Like a lobster shell, security has layers — review code before you run it.

latestvk974btba35k48svv5hfm3petnn81zg01

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📤 Clawdis
Binsbash, curl, jq

Comments