zhuoran-selfie
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill programmatically retrieves sensitive authentication tokens from local configuration files. Specifically,
zhuoran_selfie.pyreadsFEISHU_APP_IDandFEISHU_APP_SECRETfrom the~/.openclaw/.envfile, andgenerate_portrait_base.pyaccesses environment variables stored in~/.openclaw/config/main.env. - [COMMAND_EXECUTION]: The skill contains logic for executing high-risk workflows and unsanitized system calls. The file
generate_undress_video.pyis dedicated to generating sexually suggestive video content ('undress video') using prompts such as 'beautiful young woman slowly removing her wet camisole top'. Furthermore,scripts/clawra-selfie.tsuseschild_process.execto run commands with parameters likechannelandmessagethat are not sanitized, which could lead to command injection. - [PROMPT_INJECTION]: The file
templates/soul-injection.mdcontains instructions designed to override the AI agent's default operational guidelines. It defines a persona and specific keyword triggers that force the agent to prioritize the selfie generation skill over standard safety or behavioral constraints. - [EXTERNAL_DOWNLOADS]: The skill performs multiple network operations to upload local media and download generated content from third-party services, including
api.wavespeed.aiandfal.run, which are outside the scope of recognized trusted providers.
Recommendations
- AI detected serious security threats
Audit Metadata