扫描报告
0 /100
local-tts-workflow
OpenClaw text-to-speech workflow for an OpenAI-compatible TTS server, including remote/self-hosted deployments such as vLLM Omni
This is a purely documentation-based TTS workflow skill with no executable code, only showing curl examples for a local TTS server on 127.0.0.1.
可以安装
No action needed. This skill is safe to use.
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | SKILL.md:54-57 - Documents reading ~/.openclaw/openclaw.json for configuration e… |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md:59-100 - Documents curl commands to localhost TTS server endpoints |
| 命令执行 | NONE | NONE | — | No shell scripts or code files present; only documentation examples |
5 项发现
中危 外部 URL 外部 URL
http://127.0.0.1:8000/v1 SKILL.md:12 中危 外部 URL 外部 URL
http://127.0.0.1:8000/health SKILL.md:59 中危 外部 URL 外部 URL
http://127.0.0.1:8000/v1/models SKILL.md:60 中危 外部 URL 外部 URL
http://127.0.0.1:8000/v1/audio/speech SKILL.md:80 中危 外部 URL 外部 URL
http://127.0.0.1:8000/v1/audio/voice_consents references/tts-api.md:26 目录结构
2 文件 · 16.7 KB · 571 行 Markdown 2f · 571L
├─
▾
references
│ └─
tts-api.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ Pure documentation skill with no executable code or scripts
✓ All network requests target localhost (127.0.0.1:8000) only
✓ Well-structured documentation covering TTS workflow, modes, and API usage
✓ No credential harvesting, data exfiltration, or remote execution patterns
✓ No sensitive path access (SSH, AWS, .env) detected
✓ No external IP addresses or C2 infrastructure indicators
✓ No base64-encoded payloads or obfuscated code
✓ Clear, legitimate purpose for TTS server debugging and configuration