lelogin skill (乐登录凭据管理技能)
Analysis
This skill matches a credential-management CLI use case, but it includes commands that can run an unverified web installer and expose or weaken protection around secrets.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
bash -c "$(curl -fsSL https://www.nationauth.cn/dl/lelogin/cli/install-lelogin.sh)"
The skill instructs the agent to download and execute a remote installer script when the CLI is missing, with no pinned version, checksum, install spec, or reviewed helper code in the artifact set.
lelogin exec ... -- /bin/sh -c 'echo "$TEST_KEY" "$KEY2_NAME"'
The variables are populated from lelogin:// secret references; after lelogin exec resolves them, echoing them can print real secret values into terminal output, logs, or the agent transcript.
sshpass -e ssh -o StrictHostKeyChecking=no -p "$SSH_PORT" "$SSH_USER@$SSH_HOST" "echo ok"
The SSH example supplies a password from the secret manager while disabling host-key verification, which weakens protection against connecting to an impostor host.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`lelogin list`, `lelogin save ...`, `lelogin delete ...`, and `lelogin exec --env-file ...`
The skill can list accessible secret references, persistently add/update/delete secrets, and inject credentials into child processes for services such as MySQL, SSH, Alibaba Cloud CLI, and mail.
