Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
chatbi-skil-test
v1.0.1通过命令行调用 ChatBI 问数 Agent 流式接口,对企业数据表进行自然语言驱动的数据查询分析。 本工具支持:发起自然语言问数、实时跟踪 Agent 执行流程、提取意图理解/选表结果/SQL/最终回答。 当用户需要查询数据库、分析数据、用自然语言问数,或提到"ChatBI"、"问数"、"数据查询"、"SQL...
⭐ 0· 44·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (ChatBI streaming CLI for natural-language DB queries) aligns with the provided code: a CLI, a streaming HTTP client, an SSE/NDJSON parser, formatter, and models. The components present (client, parser, formatter) are appropriate and expected for the stated purpose.
Instruction Scope
Runtime instructions and code perform network calls to an API endpoint and stream back agent events; that is expected. However the SKILL.md and examples do not explicitly warn that user queries, generated payloads and default table metadata will be transmitted to the remote host. The skill also recommends being invoked with an OpenClaw exec(..., yieldMs=200) to enable streaming; this will cause incremental user query tokens and intermediate tool events to be sent and relayed in small batches. There is no instruction to sanitize sensitive queries before sending or to request explicit confirmation about the destination.
Install Mechanism
There is no formal install spec in registry metadata, but SKILL.md instructs running 'pip install -r scripts/requirements.txt' which only installs 'requests'. This is proportionate and low-risk. Note: because the package is instruction + code files bundled, running the provided Python code will execute outgoing HTTP requests — inspect code before running.
Credentials
Registry metadata declares no required environment variables or primary credential, but the code reads optional environment variables (CHATBI_API_URL, CHATBI_UIN, CHATBI_OWNER_UIN, CHATBI_APP_ID, CHATBI_WORKSPACE_ID, CHATBI_ROOM_KEY, CHATBI_NAMESPACE). More importantly, a default api_url is hardcoded (http://llmapp-prod.testsite.woa.com/...) and default table_info_list values are embedded. That means by default the user's natural-language queries and table metadata will be sent to that remote endpoint. No explicit authentication tokens are requested, but the presence of many account/workspace identifiers (uin, app_id, room_key) baked into the client may leak identifying metadata. The skill does not require credentials, but its network behavior and embedded identifiers create a privacy / exfiltration risk and should be reviewed.
Persistence & Privilege
The skill does not request permanent presence (always=false), does not modify other skills or system settings, and only writes to disk if the user explicitly passes --save-raw. It does not persist credentials or auto-enable itself. No elevated persistence behavior detected.
What to consider before installing
What to consider before installing/using this skill:
- Data destination: By default the skill will send your query text, the built payload (including table_info_list and workspace/account identifiers), and any agent events to the hardcoded api_url (http://llmapp-prod.testsite.woa.com/...). If those queries or table identifiers are sensitive, treat this as sending data offsite. You can override the endpoint via CHATBI_API_URL or the --api-url flag, and you should set it to a trusted internal endpoint before use.
- No secret required but identifiers present: The code includes baked-in UIN/app_id/workspace/room_key values. They are not secret tokens but are identifying metadata that will be included in requests. Consider removing or replacing them if you don't want those identifiers transmitted.
- Inspect code before running: Although dependencies are minimal (requests), running the CLI will perform outbound HTTP calls and stream intermediate tokens. Review scripts/chatbi_client.py and scripts/chatbi/config.py to confirm the endpoint and payload are acceptable.
- Running environment: If you must test, run in an isolated environment (separate network, staging account, or sandbox) and avoid sending production-sensitive queries until you confirm the destination is trusted.
- Optional file writes: The only file write occurs if you pass --save-raw; otherwise the tool only prints to stdout/stderr. Be cautious when saving raw events since they may contain full query text, SQL, and result data.
- If you require a stricter safety posture: do not install or run this skill until the maintainer discloses the API host owner and privacy policy, or until you configure CHATBI_API_URL to a known internal server.Like a lobster shell, security has layers — review code before you run it.
latestvk975nxqkkwaemq9hhqmtd9qt2d841ddc
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
