Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Deepin Desktop Control

v1.1.0

Control and manage Deepin desktop settings including power, display, Bluetooth, airplane mode, user accounts, and time via D-Bus system services.

0· 154·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description describe managing Deepin desktop via D‑Bus and the SKILL.md plus reference files precisely enumerate Deepin/system DBus interfaces and methods (power, display, network, bluetooth, accounts, timedate, grub, package manager, etc.). The requested resources (no env, no installs) are consistent with a purely DBus-based control skill.
!
Instruction Scope
SKILL.md instructs using busctl (--system/--session) to call DBus methods. Many of those methods are capable of changing system state (CreateUser/DeleteUser/SetPassword/SetSecretKey, SetTime/SetTimezone, SetTimeout for Grub2, EnableDevice, ToggleWireless, etc.). The docs also state introspection XML files are saved under ~/.openclaw/workspace/skills/deepin-desktop/references/, and the provided reference files already contain machine-specific values (DMI info, UUID, UID lists). That means the skill (or the included script) may collect and persist potentially sensitive local data. These actions are within the stated purpose but have high sensitivity and impact, so they warrant user caution.
Install Mechanism
Instruction-only skill with no install spec and no downloads. No packages pulled from external URLs; risk from install mechanism is low. The only code file is a small script (scripts/introspect.sh) included in the bundle — review it before running.
Credentials
The skill requests no environment variables or credentials, which is coherent. However, many DBus methods it documents require elevated privileges or polkit authorization to succeed; the skill does not describe how it will obtain those privileges. Also, the references include sensitive local identifiers (machine UUID, user lists).
!
Persistence & Privilege
The SKILL.md explicitly says introspection XML will be saved under ~/.openclaw/workspace/skills/deepin-desktop/references/ and the bundle contains many such reference files. That implies the skill will persist system introspection output to disk in the user's home. While not a platform-level privilege escalation, persistent storage of system metadata (and potentially secrets if methods are callable) increases risk if those files are shared or exfiltrated. The skill is not marked always:true, but autonomous invocation (platform default) would allow it to run without explicit user prompts; combine that with the sensitive methods and persisted data to raise caution.
What to consider before installing
This skill appears to be a coherent DBus-based controller for Deepin desktop, but it can query and change sensitive system state (users, passwords/secret keys, time, network, grub, etc.) and will write introspection output to ~/.openclaw/.../references/ (the provided reference files already contain machine identifiers and user info). Before installing or enabling: (1) Review the included scripts (scripts/introspect.sh) to see exactly what will run and what is saved. (2) Only use this skill on machines you control or in test environments. (3) Be aware many methods require root/polkit; the skill doesn't explain how it obtains authorization. (4) Avoid enabling autonomous invocation unless you fully trust the author and have inspected the code. (5) If you need only read-only queries, restrict usage and avoid running methods that modify accounts or system configuration. If you can, request the author to document which operations require privilege and to avoid persisting machine-unique data by default.

Like a lobster shell, security has layers — review code before you run it.

latestvk972m6kqh80ja9zjxhe6t63nax83727d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments