TencentCloud IDCard OCR
Analysis
The skill coherently calls Tencent Cloud’s ID-card OCR service, but users should notice that it sends sensitive ID images and extracted identity details to Tencent Cloud using their API credentials.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
依赖:`tencentcloud-sdk-python`(通过 `pip install tencentcloud-sdk-python` 安装)
The documented dependency is installed via an unpinned pip command and there is no install spec locking the version. The dependency is expected for this Tencent Cloud integration, but provenance and version are not constrained.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
secret_id = os.environ.get("TENCENTCLOUD_SECRET_ID") ... secret_key = os.environ.get("TENCENTCLOUD_SECRET_KEY") ... cred = credential.Credential(secret_id, secret_key)The skill uses Tencent Cloud API credentials from environment variables. This is purpose-aligned for calling the OCR service, but cloud credentials are sensitive and the registry metadata lists no required env vars or primary credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
http_profile.endpoint = "ocr.tencentcloudapi.com" ... req.ImageUrl = args.image_url ... req.ImageBase64 = load_image_base64(args.image_base64) ... resp = client.IDCardOCR(req)
The user-provided ID image URL or Base64/local image content is sent to Tencent Cloud’s OCR API. This is expected for the stated purpose, but it crosses an external provider data boundary with sensitive identity data.
