scrapling-article-fetch
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/md_to_feishu_doc.pyaccesses sensitive Feishu API credentials (appIdandappSecret) from a local configuration file. The file path is hardcoded to a specific user directory (/home/lenovo/.openclaw/openclaw.json), which may cause issues in different environments. - [EXTERNAL_DOWNLOADS]: The skill uses the
scraplinglibrary to fetch content and images from arbitrary third-party URLs provided by the user. It also downloads images from these URLs to upload them to Feishu. - [COMMAND_EXECUTION]: The skill relies on shell scripts (
scripts/run_pipeline.sh) and Python scripts to perform environment checks, scraping, and document generation. It dynamically constructs command lines to run these scripts usinguvorpython. - [PROMPT_INJECTION]: The
SKILL.mdfile contains strong instructions (e.g., "must execute the following process", "no additional confirmation needed") to ensure the agent follows the automated workflow. While authoritative, these instructions appear to be for task automation rather than malicious behavior modification. - [DATA_EXFILTRATION]: No evidence of unauthorized data exfiltration was found. Network operations are directed towards well-known Feishu API endpoints (
open.feishu.cn) and user-requested article URLs.
Audit Metadata