xianyu-data-grabber

Warn

Audited by Socket on Mar 29, 2026

6 alerts found:

Anomalyx5Security
AnomalyLOW
grabber.js

This module is a web-scraping automation tool that captures screenshots from goofish.com, runs local OCR (ocr.py), writes reports, and optionally uploads results via uploader.sh. It includes scraping-evasion features and has a notable potential security risk: execSync is invoked via shell command strings, and the screenshot path embeds the keyword without sanitization, which could enable command injection if attackers can influence keywords. Additionally, the upload behavior is opaque because uploader.sh is executed directly. No clear evidence of classic malware (C2, keylogging, ransomware, cryptomining) is present in the shown snippet, but the process-spawning and unsanitized input into command strings warrant review.

Confidence: 62%Severity: 63%
AnomalyLOW
README.md

Based on the provided fragment, there is no direct proof of embedded malware, but the described workflow is inherently high-risk from an abuse/data-governance standpoint: it automates scraping intended to bypass anti-bot protections, processes content via OCR, and can exfiltrate/transfer harvested artifacts to a third-party repository using a plaintext token and optional site cookie. Review the actual grabber/uploader implementations for strict network destinations, credential handling (no logging/commit), and whether the tool performs any additional collection or unexpected upload behavior.

Confidence: 42%Severity: 62%
AnomalyLOW
install.sh

This Bash fragment itself does not show overt malicious payloads, obfuscation, or direct exfiltration. However, it is a credential-capable installer that (1) stores token/cookie material for later authenticated actions, (2) installs browser automation tooling and downloads Chromium, and (3) installs multiple recurring cron jobs that will execute downstream scraping/uploader/processing scripts. Without reviewing the invoked run.sh/JS/Python modules, the likelihood of benign intent cannot be confirmed; treat this as a potentially suspicious initializer with moderate-to-high security risk primarily due to persistence, secrets handling, and increased supply-chain/scheduled-execution attack surface.

Confidence: 60%Severity: 62%
AnomalyLOW
run.sh

This Bash file functions as a dispatcher/orchestrator and contains no clear malicious payload by itself (no hardcoded secrets, no obfuscation, and no explicit network activity). The main security concern is supply-chain risk: it executes several high-impact helper scripts (upload, cron setup, and update/self-update) and forwards user-controlled arguments to node/python tooling without validation. Review the delegated scripts—especially uploader.sh and update.sh—for exfiltration, persistence, or arbitrary code execution; those components cannot be assessed from this fragment alone.

Confidence: 60%Severity: 58%
AnomalyLOW
SKILL.md

该技能的主要能力与“闲鱼数据抓取/竞品分析”目的基本一致,但其实际足迹偏高:要求登录 Cookie、自动化规避反爬、定时执行,并把截图和数据外发到 Gitee。未见明显第三方凭证收集或隐藏外传,因此更像高敏感抓取工具而非确认恶意;综合判定为 SUSPICIOUS。

Confidence: 85%Severity: 64%
SecurityMEDIUM
update.sh

This is an auto-updater/installer that downloads a remote repository archive from Gitee, unpacks it, destructively removes the current installation, and overwrites the local project directory with the downloaded contents. The snippet shows no direct data theft or command-and-control payload, but it lacks any integrity/authenticity verification for the downloaded code and installs from an unpinned main-branch artifact—creating a significant supply-chain execution risk if the remote source or download pipeline is compromised.

Confidence: 66%Severity: 78%
Audit Metadata
Analyzed At
Mar 29, 2026, 08:18 AM
Package URL
pkg:socket/skills-sh/openclaw%2Fskills%2Fxianyu-data-grabber%2F@8c0c6cf4c428cdc31e7164d68f8328f0e3003fb3