PIPL-Compliance(PIPL合规工具)
Analysis
This appears to be a local PIPL compliance toolkit with user-directed Python commands; no artifact-backed exfiltration, hidden network use, or destructive behavior was found.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
pandas>=2.0.0 jinja2>=3.1.0
The skill relies on external Python packages specified with version lower bounds rather than exact pinned versions. This is normal for a Python CLI tool, but dependency resolution can change over time.
pip install -r requirements.txt python scripts/pipl-check.py --scenario user-registration --output report.json
The skill asks users or agents to run local Python commands and write report files. This is central to its stated purpose and is user-directed, but it is still local command/file-write capability.
总体评估 ... 可以安全安装使用
The guide includes self-attested security conclusions. They are accompanied by suggested checks and are not contradicted by the provided static scan, but users should not treat self-attestation as independent approval.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
'id_card': '身份证号码', 'phone': '手机号码', 'email': '电子邮箱', 'address': '住址', 'biometric': '生物识别信息'
The validator is designed to inspect personal and sensitive information fields, and the workflow generates local reports/documents that may preserve compliance inputs or summaries.
