Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
steampunk-transform-video-gen-seedance2-0
v1.0.0Rebuild any brief into Victorian-industrial steampunk: brass, wood, steam plumes, visible mechanisms—WeryAI Seedance 2.0 only. Use when you need retro-factor...
⭐ 0· 80·0 current·0 all-time
byparallel world@zoucdr
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description, required binary (node), and required env (WERYAI_API_KEY) align with a WeryAI video-generation wrapper. The package asks for only the WERYAI_API_KEY and Node 18+, which is proportionate. One coherence issue: SKILL.md mandates callers must use the SEEDANCE_2_0 model and show it in confirmation, but scripts/video_gen.js explicitly documents that it does not enforce a model allowlist — this leaves enforcement to the agent/operator rather than the code itself.
Instruction Scope
SKILL.md stays on scope (prompt expansion, confirmation, then running the CLI). It documents and limits actions (requires explicit consent before local file upload). However, the runtime instructions plus the script mean that if the agent or operator passes a local path the CLI will read that file and upload it to WeryAI (using the API key). That behavior is documented but is a sensitive operation (local file read + remote upload) and requires explicit human consent — if the agent auto-supplies or auto-discovers paths, private files could be exposed.
Install Mechanism
Instruction-only skill with a shipped Node script; no install spec or remote downloads. No archive or external installer is used, so nothing arbitrary is pulled from the network at install time.
Credentials
Only WERYAI_API_KEY is required and is the primary credential; this matches the skill's stated purpose (calling WeryAI models and upload endpoint). No unrelated credentials or env variables are requested.
Persistence & Privilege
always:false (not forced into every agent run). The skill does not request persistent system-wide privileges or modify other skills. Autonomous invocation is allowed (platform default) but not combined with unusual privileges here.
What to consider before installing
This skill appears to be a legitimate Node.js wrapper for WeryAI video generation, but take these precautions before installing or using it:
- Review scripts/video_gen.js yourself (or ask a trusted reviewer). The script will read any local image path you pass and upload it to WeryAI using your WERYAI_API_KEY; do not provide local file paths unless you explicitly consent and have verified the script behavior.
- Follow the SKILL.md instruction to require explicit confirmation showing the full expanded prompt and ensure the model field is set to SEEDANCE_2_0. The script itself does not enforce that model allowlist — accidental use of other model keys is possible if the agent or operator supplies them.
- Treat WERYAI_API_KEY as a secret. Use a scoped or short-lived key if possible, and run generation from an isolated account/container for sensitive content.
- Prefer supplying public https image URLs (the script enforces that for remote images). If you must use a local file, verify the filename and that it is intended for upload.
- If you want stronger safeguards, modify the script to: (1) enforce model === "SEEDANCE_2_0" at runtime, and (2) require an explicit interactive confirmation before reading any local path (or disable local-file upload entirely).
Given the documented local-file upload behavior and the model-enforcement gap, proceed only if you trust the skill source and follow the above mitigations.scripts/video_gen.js:675
Environment variable access combined with network send.
scripts/video_gen.js:223
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk977pnmj14ww0mfsdx0hmrfrf583def5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⚙️ Clawdis
Binsnode
EnvWERYAI_API_KEY
Primary envWERYAI_API_KEY
