Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
跨平台内容自动发布
v1.0.0跨平台内容自动化发布工作流,支持AI原创内容生成、视频制作、自动发布到小红书、抖音等平台,支持国内视频搬运去重后发布到TikTok/YouTube。
⭐ 0· 47·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The README/SKILL.md claim a full end-to-end pipeline (AI content generation, video downloading, de-duplication, cross‑posting). However many core pieces in the shipped code are placeholders/stubs (e.g., generateContent returns empty content, downloadVideos returns [] in src/workflows/video-cross-post.js). The project also relies on external skills/peerDependencies (xiaohongshu-content-automation, playwright-browser-automation, remotion-video-toolkit) rather than implementing them. This mismatch between claimed functionality and delivered implementation is significant: the skill advertises capabilities it doesn't implement locally and expects other components to provide them.
Instruction Scope
Runtime instructions direct the agent/user to install Playwright and ffmpeg and to configure cookie files (config/accounts.json). The code reads/writes local cookie/storageState files under auth/ and writes logs to output/. Publishers use Playwright to navigate platform sites and save storageState (cookies). The publishers also add evasive automation changes (navigator.webdriver override in xiaohongshu-publisher.js) and set geolocation/permissions in tiktok-publisher.js — behavior intended to avoid detection and to present a US location. Those behaviors are coherent with cross-posting purpose but expand scope to include actions that can affect account fingerprinting and location spoofing. Also, SKILL.md instructs video downloading/scraping but the implementation for downloading is missing, so actual runtime behavior depends on additional tools/code not present here.
Install Mechanism
This is instruction-only with code files included; there is no install script that fetches remote archives. package.json has no runtime dependencies but lists peerDependencies. The SKILL.md asks users to run npm install and npx playwright install and to install ffmpeg manually — standard for this type of tool. No external arbitrary download URLs or opaque installers are present in the repo.
Credentials
The skill declares no required environment variables or credentials, which aligns with what is shipped. However it requires storing and reading browser storageState files (cookies) under auth/ and config/accounts.json; those files contain session tokens and should be treated as sensitive. The code will save authentication state (context.storageState) to user-specified cookiePath and read it back to automate logins. Requesting cookie files (not env secrets) is proportionate to automated publishing, but it creates a sensitive local credential surface that users must protect.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or system-wide settings. It writes its own auth/ and output/ files (saving session state and logs), which is expected for this functionality. Autonomous invocation is allowed (default) but not combined with any exceptional privileges.
What to consider before installing
This skill automates browser logins and saves session cookies locally, and it includes code to spoof/evade automation detection (navigator.webdriver override, geolocation). Before installing: (1) Understand that auth files saved under auth/ (storageState cookies) are sensitive—store them securely and remove them if you stop using the skill. (2) The repo advertises full scraping, AI-generation and downloading workflows but many functions are placeholders; you will need to provide or trust external tools/skills (yt-dlp, xiaohongshu-content-automation, remotion, TTS) to get full behavior. (3) Automating cross-posting of others' content may violate platform rules or copyright—ensure you have rights to repost. (4) If you proceed, review the publishers' automation scripts and config paths, and run them in a controlled environment (separate accounts) until you confirm behavior. If you want a safer alternative, use tools that rely on official platform APIs and OAuth rather than browser cookie reuse and UI automation.src/workflows/video-cross-post.js:111
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
automationvk972bdd25hfyzqt57j40t50mas83xqtvcross-platformvk972bdd25hfyzqt57j40t50mas83xqtvlatestvk972bdd25hfyzqt57j40t50mas83xqtvsocial-mediavk972bdd25hfyzqt57j40t50mas83xqtvtiktokvk972bdd25hfyzqt57j40t50mas83xqtvxiaohongshuvk972bdd25hfyzqt57j40t50mas83xqtvyoutubevk972bdd25hfyzqt57j40t50mas83xqtv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
