Jd Search

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a narrow JD internal product-search helper, but the reviewed files do not include the CLI executable it describes.

Before installing, confirm you are authorized to use the JD internal search service and inspect or obtain the missing `jd-search` executable from a trusted source. Do not symlink or run an unverified command.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may not run as packaged, or a user may end up running a `jd-search` binary from somewhere else that was not part of this review.

Why it was flagged

The package declares a runnable CLI file, but the supplied manifest/code-presence data shows no `jd-search` implementation and no install spec, so the command code was not reviewable.

Skill content
"bin": {
    "jd-search": "./jd-search"
  }
Recommendation

Verify the exact `jd-search` executable source and contents before adding it to PATH or allowing the agent to invoke it.

What this means

Searches may access internal JD infrastructure and should only be run by users who are authorized to use that environment.

Why it was flagged

The skill targets an internal JD service. That is purpose-aligned for this JD Gongcai search helper, but it relies on organizational network access.

Skill content
- **接口地址**: `http://vproxy-search.jd.local/`
...
1. 接口为内网服务,需在京东内网环境调用
Recommendation

Use this only on an authorized JD internal network, and avoid sending search terms that should not be queried against that service.