扫描报告
5 /100
skillme
Use when user asks to find, search, add, or install skills, or discover agent capabilities. Searches ClawHub and skills.sh simultaneously and can auto-convert skills.sh results into OpenClaw-compatible format.
Skill discovery and conversion tool with fully documented behavior; all network fetches target known GitHub URLs, file writes are scoped to user-specified output paths, and shell usage is explicitly shown in SKILL.md.
可以安装
No action needed. If policy requires declared capabilities in frontmatter, add a capability declaration to SKILL.md for future hardening.
安全发现 1 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 提示 | Missing capability frontmatter 文档欺骗 | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✓ 一致 | SKILL.md lines 12-20 show exec clawhub/npx commands |
| 网络访问 | NONE | READ | ✓ 一致 | SKILL.md lines 54-60 describe URL fetching; scripts/convert_skillssh.py:fetch_ur… |
| 文件系统 | NONE | WRITE | ✓ 一致 | SKILL.md line 64 shows python convert script with --output flag; scripts/convert… |
4 项发现
中危 外部 URL 外部 URL
https://skills.sh/vercel-labs/agent-skills/react-best-practices SKILL.md:52 中危 外部 URL 外部 URL
https://skills.sh/owner/repo/skill scripts/convert_skillssh.py:10 中危 外部 URL 外部 URL
https://skills.sh/ scripts/convert_skillssh.py:46 中危 外部 URL 外部 URL
https://skills.sh/owner/repo/skill\n scripts/convert_skillssh.py:90 目录结构
2 文件 · 14.1 KB · 418 行 Python 1f · 272L
Markdown 1f · 146L
├─
▾
scripts
│ └─
convert_skillssh.py
Python
└─
SKILL.md
Markdown
安全亮点
✓ All network requests target explicit GitHub URLs (raw.githubusercontent.com, raw.githubusercontent.com) — no arbitrary IP or C2
✓ File writes are scoped to user-supplied --output path — no unconditional writes to sensitive locations
✓ No obfuscation: script is readable Python with clear function names
✓ No credential harvesting or environment variable iteration
✓ No base64-encoded payloads, no eval(), no subprocess.Popen with shell=True from untrusted input
✓ URL fetching uses Python stdlib urllib — no third-party HTTP libraries that could exfiltrate data
✓ Input parsing uses safe argument parser with no shell=True risk
✓ The alternate-URL fallback in try_alternate_urls() only probes GitHub-owned domains