Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Deep Research Pro v5.0.1

v5.0.1

Performs deep research using a three-stage process: data extraction, thematic insight briefs with contradiction analysis, and narrative-driven strategic repo...

0· 100·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (deep research + extraction/quality gating) aligns with the included scripts and templates. However SKILL.md and the run examples reference 'PubMed API' and a '<pmid>' argument while scripts.extract-pmc.py constructs a PMC URL (expects a PMC id) — a documentation/expectation mismatch. All required capabilities (PDF/PMC extraction, quality scoring, synthesis) are present and consistent with the stated purpose; no unrelated credentials or binaries are requested.
!
Instruction Scope
Runtime instructions call local scripts that (a) fetch remote resources (extract-from-pdf.py downloads arbitrary PDF URLs provided by the caller) and (b) read and grep report/source files. The scripts write extracted JSON to /tmp and create reports under supplied research directories. The agent instructions do not ask for unrelated secrets, but the ability to download arbitrary URLs can be abused (SSRF or fetching internal endpoints) if untrusted inputs are used. Also SKILL.md example usage (<pmid>) may mislead users about correct inputs (pmid vs pmcid).
Install Mechanism
This is instruction-plus-script (no install spec). No remote installers, package downloads, or archive extraction are performed by the skill itself. The code uses standard Python libraries and requests/pdf parsers if installed. Lowest install risk from package distribution perspective.
Credentials
Skill requests no environment variables, no credentials, and no config paths. The scripts only perform network requests to source sites (NCBI/any provided PDF URLs). No unrelated service tokens are requested. This is proportionate to the stated research purpose.
Persistence & Privilege
The skill is not always:true and does not request persistent privileges. One implementation detail: synthesize.sh invokes the check script via an absolute path (/root/.openclaw/.../scripts/check-sourcing.sh). That is odd but not inherently privileged — it may fail on some hosts or indicate assumptions about runtime layout. No code attempts to modify other skills or system-wide config.
What to consider before installing
What to check before installing or running: - Input handling: The PDF extractor will download any URL you pass to it. Treat this as a network-capable program: do not pass untrusted or internal network URLs (SSRF risk). Run the scripts in a sandboxed environment with network egress controls if possible. - Documentation mismatch: SKILL.md shows usage with '<pmid>'/PubMed, but scripts.extract-pmc.py builds a PMC URL (expects a PMC id). Confirm which identifier to pass and test on benign known PMCID values first. - Hard-coded paths: synthesize.sh calls the check script using a /root/.openclaw/... absolute path. That may fail or, if the environment mirrors that path, read files from unexpected locations. Inspect and (if needed) modify the script to use relative paths inside the research directory before running. - Review network targets: extract-pmc.py requests NCBI/PMC (expected) and extract-from-pdf.py fetches arbitrary URLs (expected for PDFs). Ensure your runtime allows only the external hosts you trust; consider disabling outbound network or restricting DNS if you are uncertain. - Sanity-check outputs: the scripts write temporary JSON to /tmp and generate reports. Review those outputs and run check-sourcing.sh manually to confirm it only accesses expected 'sources' files. - Run first in an isolated environment: because the skill performs network I/O and file reads/writes, test it inside a container or VM with limited network access and without sensitive files mounted. If you need higher assurance, ask the skill author to: (1) fix the pmid/pmcid documentation mismatch, (2) avoid hard-coded absolute paths, and (3) add explicit input validation/whitelisting for PDF URLs.

Like a lobster shell, security has layers — review code before you run it.

deepvk9780t67v5nysdtw4z9jxv6jth8365yfinsightvk9780t67v5nysdtw4z9jxv6jth8365yflatestvk9780t67v5nysdtw4z9jxv6jth8365yfresearchvk9780t67v5nysdtw4z9jxv6jth8365yfv5vk9780t67v5nysdtw4z9jxv6jth8365yf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments