Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Codeup
v1.0.0阿里云云效 Codeup 代码仓库管理工具集。使用场景包括:(1) 代码仓库操作 - 分支管理、文件操作、代码对比、合并请求/MR管理 (2) 组织管理 - 部门管理、成员查询、角色管理 (3) 操作 codeup 仓库、分支、MR、合并请求 (4) 查询云效组织成员、部门列表
⭐ 0· 77·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name and description claim a Codeup (阿里云云效) repository/org management tool; included Python client and CLI scripts implement exactly those operations against an AlibabaCloud API endpoint. The functionality requested (token-based API access) is appropriate for the stated purpose. However the registry metadata lists 'Required env vars: none' while both SKILL.md and the code require YUNXIAO_ACCESS_TOKEN — a mismatch between metadata and actual requirements.
Instruction Scope
SKILL.md instructs the user to set YUNXIAO_ACCESS_TOKEN and to run the provided Python CLI; the code implements the documented commands. The instructions do not request other system files, unrelated credentials, or exfiltration endpoints; network calls are limited to a single BASE_URL (openapi-rdc.aliyuncs.com) consistent with AlibabaCloud APIs.
Install Mechanism
There is no install spec (instruction-only skill plus included scripts). The package includes a simple requirements.txt (requests) and Python scripts; no remote downloads, installers, or archive extraction are used. Risk from install mechanism is low, but the runtime requires Python and the 'requests' library.
Credentials
Runtime code and SKILL.md require a single API token (YUNXIAO_ACCESS_TOKEN), which is proportionate for a remote API client. The concern is the metadata omission: the skill registry claims no required environment variables while the skill actually requires a sensitive token. This mismatch could mislead users into installing without preparing the token or misunderstanding what will be accessed. Also review token scope and rotate/remove tokens used for testing.
Persistence & Privilege
Skill flags show always: false and model invocation is not disabled (normal). The skill does not request persistent system-wide changes or modify other skills. It simply runs as an on-demand CLI that performs network calls.
What to consider before installing
This skill appears to implement a legitimate Codeup (阿里云云效) CLI that needs a YUNXIAO_ACCESS_TOKEN to call AlibabaCloud APIs. Before installing or running it: 1) Note the registry metadata incorrectly states there are no required env vars — you must set YUNXIAO_ACCESS_TOKEN in your environment. 2) Treat that token as sensitive: use a token with the minimum scope needed, and avoid exposing long-lived high-privilege tokens. 3) Inspect the scripts locally (they are provided) and run them in a controlled environment first; the CLI issues HTTP requests to https://openapi-rdc.aliyuncs.com. 4) If you plan to let an autonomous agent use this skill, be cautious — the agent will be able to use the token to list org members, read/write files, create/delete branches and MRs. 5) Consider testing with a read-only or limited-scope token, and confirm the behavior of functions that require commit messages or may raise ValueError (some tests indicate certain parameters are mandatory).Like a lobster shell, security has layers — review code before you run it.
latestvk97255zvw1b7ctah9nbej4yv2n83g69w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
