Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Post Content Moderation
v1.2.1Review, rewrite, and moderate user-generated posts across title, body text, images, and videos to block ads and contact information while allowing configurab...
⭐ 0· 160·0 current·0 all-time
byXavier Mary@xaviermary56
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name and description (post moderation across text/media) match the instructions and API shapes: the skill expects to call external model APIs and return structured audit results. However the documentation repeatedly references bundled PHP demo scripts and a media-inspector placeholder (scripts/) that are not present in the package manifest — this is an inconsistency the integrator should confirm (either the demos are omitted from this package or the docs are stale).
Instruction Scope
The SKILL.md and reference docs explicitly instruct pulling pending posts, sending title/content/image/video URLs (and whitelist/custom rules) to external model APIs, and performing callbacks. That means post text, media URLs and related context may leave the environment. The docs do call this out and recommend safety controls, but the runtime instructions do direct data to external endpoints — a real privacy / data-exfiltration risk if not correctly allowlisted or if secrets are misconfigured.
Install Mechanism
This is an instruction-only skill with no install spec and no bundled code files in the manifest. That lowers supply-chain risk. The only potential install-time risk would come from following the documentation to deploy external demo scripts (which are described but not present here).
Credentials
The manifest declares no required environment variables, but the docs repeatedly recommend using secrets (e.g., XAI_API_KEY), MODERATION_DRY_RUN, and host allowlists. The absence of declared required env vars is a documentation/metadata mismatch — the skill will practically need API keys and config if you wire it up, so treat that as expected but verify required secrets before use.
Persistence & Privilege
The skill is not marked always:true and uses default agent invocation permissions. It does not request persistent system-wide privileges in the manifest. Autonomous invocation is allowed (default) — combine this with the skill's network behavior only if you plan to let it run automatically.
What to consider before installing
This skill is a moderation integration that is explicitly built to call external moderation/model APIs and to callback results to your backend. That is coherent with its purpose, but you should not install or enable it in production until you do the following checks:
1) Confirm whether the package actually includes the demo PHP scripts referenced in the docs (scripts/*). The docs describe code that will send data externally; if those scripts are present, inspect them before running. If they are absent, the docs may be stale.
2) Treat all post text, image/video URLs, whitelist entries and custom rules as potentially exfiltratable. Ensure you have a narrow allowed_hosts list for model, pull, and callback endpoints and never allow arbitrary destinations.
3) Use a dry-run mode (MODERATION_DRY_RUN) and run end-to-end tests before enabling callbacks that write results to production systems.
4) Do not hardcode API keys; inject them via environment variables and confirm which env names your deployed code expects (docs reference XAI_API_KEY and other config keys even though the manifest lists none).
5) If you require real image/video inspection, implement and verify a local preprocessing pipeline (OCR, QR detection, ASR, frame extraction) — the included media inspector is a placeholder according to the docs.
6) Restrict autonomous execution (agent invocation) in sensitive environments or require explicit human review for ambiguous cases; if you plan to allow fully automatic mode, enforce fail-closed policies and timeouts.
If you cannot verify the presence and content of the demo scripts, or you cannot enforce strict allowlists and dry-run testing, consider treating this skill as risky and avoid enabling automatic callbacks on production data.Like a lobster shell, security has layers — review code before you run it.
content-reviewvk9765nqfm27hz705msfajthy9h8348d4latestvk978wcvfb0kv95yyhzxe1ts59d83a28wmoderationvk9765nqfm27hz705msfajthy9h8348d4phpvk9765nqfm27hz705msfajthy9h8348d4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
