Suspicious — Risk Score 55/100
Last scan:20 hr ago Rescan
55 /100
tiktok-video-downloader
Download TikTok videos without watermark in HD quality
The skill claims transparency and 'no data collection' but performs undeclared filesystem writes to track user usage data in ~/.openclaw, creating a directory and usage.json file without disclosure.
Skill Nametiktok-video-downloader
Duration44.2s
Enginepi
Use with caution
Do not use. The skill contains significant doc-to-code mismatches: claims no data collection while writing user tracking data to home directory. Payment integration with crypto wallet is also undisclosed. If used, run in sandboxed environment with no access to sensitive paths.

Findings 4 items

Severity Finding Location
High
False claim of 'no data collection' Doc Mismatch
SKILL.md explicitly states 'We do not collect, store, or transmit any user data' but the code creates a usage tracking file in the user's home directory at ~/.openclaw/skills/tiktok-video-downloader/usage.json
usage_dir = home / '.openclaw' / 'skills' / 'tiktok-video-downloader'
usage_dir.mkdir(parents=True, exist_ok=True)
return usage_dir / 'usage.json'
→ Update SKILL.md to declare filesystem WRITE access for quota tracking, or remove the local storage and track quotas server-side only
scripts/fetch_tiktok_video.py:30
High
Undeclared crypto payment integration Doc Mismatch
Code contains a hardcoded Polygon USDC wallet address and Request Network payment integration for monetization. This commercial payment feature is not disclosed anywhere in SKILL.md
WALLET_ADDRESS = '0xA4195EeFF370c003C5C775BE4C3f350022666305'  # Polygon USDC
PAYMENT_URL = f'https://pay.request.network/{WALLET_ADDRESS}...'
→ Disclose payment integration in SKILL.md with clear terms of service and privacy policy
scripts/fetch_tiktok_video.py:23
Medium
Undeclared filesystem WRITE to home directory Priv Escalation
The skill writes to ~/.openclaw directory which may be an OpenClaw-specific path. This creates persistent state on the user's system without declaring filesystem WRITE permission
with open(usage_file, 'w') as f:
    json.dump(usage, f)
→ Declare filesystem:WRITE in capability map and document what data is stored and why
scripts/fetch_tiktok_video.py:38
Low
Misleading 'open source' claim Doc Mismatch
SKILL.md states 'Open source: All code is visible and auditable in this skill package' but this merely means the code is included. True open source implies version control, issue tracking, and community oversight
**Open source**: All code is visible and auditable in this skill package
→ Rephrase to clarify code is included in the package rather than implying traditional open source project
SKILL.md:30
ResourceDeclaredInferredStatusEvidence
Filesystem NONE WRITE ✗ Violation scripts/fetch_tiktok_video.py:30-31 - creates ~/.openclaw/skills/tiktok-video-do…
Network READ READ ✓ Aligned Scripts make POST requests to savefbs.com API as declared
5 findings
🔗
Medium External URL 外部 URL
https://savefbs.com
SKILL.md:8
🔗
Medium External URL 外部 URL
https://savefbs.com/pricing
SKILL.md:18
🔗
Medium External URL 外部 URL
https://www.tiktok.com/@username/video/1234567890
SKILL.md:59
💰
Medium Wallet Address 加密货币钱包地址
0xA4195EeFF370c003C5C775BE4C3f350022666305
scripts/fetch_tiktok_video.py:23
🔗
Medium External URL 外部 URL
https://pay.request.network/
scripts/fetch_tiktok_video.py:24

File Tree

2 files · 9.5 KB · 309 lines
Python 1f · 191L Markdown 1f · 118L
├─ 📁 scripts
│ └─ 🐍 fetch_tiktok_video.py Python 191L · 6.1 KB
└─ 📝 SKILL.md Markdown 118L · 3.4 KB

Dependencies 1 items

PackageVersionSourceKnown VulnsNotes
requests * pip No Version not pinned - could fetch any version

Security Positives

✓ No reverse shell or command execution to attacker-controlled infrastructure
✓ No credential theft or API key harvesting detected
✓ No base64 or obfuscated code execution
✓ No attempts to access ~/.ssh, ~/.aws, or other sensitive credential paths
✓ Network requests only go to declared domain (savefbs.com)
✓ Uses legitimate payment service (Request Network) for monetization