Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

docx-md

v1.0.1

Low-level docx format tool for AI document review. Three operations: (1) read docx → output compact Markdown or JSON; (2) apply edits JSON back to docx (trac...

0· 586·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (docx → compact markdown/JSON → apply edits → finalize) match the actual artifacts: three scripts (read, apply, finalize), requirements (lxml, docx-revisions), and documentation. There are no requested environment variables, binaries, or external credentials unrelated to DOCX processing.
Instruction Scope
SKILL.md and the scripts limit actions to reading a supplied .docx, producing Markdown/JSON, applying edits to a supplied .docx, and finalizing (accept changes/remove comments). All file IO is explicitly on user-provided paths. One implementation detail to note: finalize_docx removes comment markup by decoding document.xml as UTF-8 and applying regex replacements on raw XML bytes (fragile approach that can corrupt edge-case documents), but this is a scope/robustness issue rather than extraneous or malicious behavior.
Install Mechanism
There is no platform install spec (instruction-only install). The bundled requirements.txt lists lxml and docx-revisions (both reasonable for OOXML manipulation). No downloads from arbitrary URLs or archive extraction are present.
Credentials
The skill requests no environment variables or secrets. The only runtime inputs are file paths supplied by the user; dependencies are standard Python packages relevant to the stated functions.
Persistence & Privilege
The skill does not request always:true, does not modify other skills or global agent configuration, and does not require ongoing background presence. It performs one-shot file operations when invoked.
Assessment
This package appears coherent and implements what it advertises. Before installing or running: (1) review and test on copies of documents (the finalize script uses regex on XML which can be fragile); (2) be aware the code is GPL-3.0 — incorporating it into proprietary code may have license implications; (3) install the required Python packages (lxml, docx-revisions) in an isolated environment; (4) because the source is 'unknown', if you need high assurance consider auditing the scripts (they are included) or running them in a sandbox; and (5) always supply explicit file paths — the scripts operate on files you give them and do not attempt network communication or secret collection.

Like a lobster shell, security has layers — review code before you run it.

latestvk974nkkstzptz5se5d0g6gw2qh81p36s

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments