识别5300中银行流水样式、识别简版征信、详版征信、企业版征信等各种信贷文件汇总成专业分析报告。
Analysis
This skill matches its stated credit-file analysis purpose, but it sends highly sensitive credit/bank documents and optional PDF passwords to an external provider using a hardcoded service key.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
需要 Python 3.7+ 环境 - 需要安装 `requests` 库(`pip install requests`)
The skill depends on local Python and an unpinned third-party package install, but the registry has no install spec or required binary declarations. This is expected for the included script, but users should notice the local dependency.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
ENTERPRISE_KEY = "26b22ed9a21c42ec89b07b6299cdceb5" ... payload = {"enterpriseKey": ENTERPRISE_KEY, "dateTime": now_text()}A provider enterprise key is hardcoded and used to obtain a token, even though the registry declares no primary credential. This makes the account/permission boundary unclear for users.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"filePackage": file_url ... if password: payload["passWord"] = password ... data = post("enterpriseApi/fileUpload", payload, token=token)The script sends the user-supplied document URL and optional PDF password to an external provider API. Because the files are credit reports or bank statements, this is highly sensitive data handling and the artifacts do not define retention, access controls, or privacy boundaries.
