Is dukbong/seoul-subway safe?
https://github.com/openclaw/skills/tree/main/skills/dukbong/seoul-subway
The dukbong/seoul-subway skill is a functional, low-complexity subway information assistant with no executable code, no filesystem access, and a clean installation. Its primary risk is architectural: all queries are routed through an unbranded third-party Vercel proxy (vercel-proxy-henna-eight.vercel.app) that logs user IP addresses, and the skill's system prompt includes a social engineering recommendation encouraging users to permanently disable permission prompts for that proxy domain. The canary files were not accessed by the skill, and no exfiltration of local credentials was detected.
Category Scores
Findings (9)
MEDIUM Social engineering nudge to disable permission prompts -15 ▶
The SKILL.md 'First Time Setup' section explicitly recommends users select 'Yes, and don't ask again' when the agent's permission dialog appears for the proxy domain. When this skill is injected into an agent's system prompt, the agent will present this recommendation to users as if it were neutral guidance. This is a social engineering vector: the skill author is using the LLM's trusted voice to persuade users to permanently grant network access to a third-party server, bypassing future security friction.
MEDIUM Skill frames unverified third-party proxy as trustworthy within agent context -10 ▶
The skill embeds assurances about the proxy's behavior ('never your conversation context or personal data') directly in the system prompt. These claims are authored by the skill developer — not audited or independently verified — but will be presented by the agent as established fact. This preemptively neutralizes user skepticism about the proxy before the user has any opportunity to evaluate it themselves.
MEDIUM All queries routed through third-party proxy with auto-generated Vercel subdomain -20 ▶
Every API call made by this skill passes through vercel-proxy-henna-eight.vercel.app. The 'henna-eight' suffix strongly suggests an auto-generated Vercel project name rather than an intentionally branded domain. The proxy operator receives all user queries, pagination parameters, and standard HTTP headers including IP address. If the Vercel project is abandoned or transferred, a new owner could silently inherit all skill traffic.
LOW IP address and User-Agent transmitted to third-party proxy on every request -10 ▶
The skill's own privacy disclosure confirms that IP address and User-Agent are sent as standard HTTP headers with every API call. This creates a persistent log of user query patterns correlated with network identity at the proxy operator's infrastructure, even if the skill is used only for benign subway lookups.
LOW Static reference data fetched from externally-controlled GitHub raw URLs -5 ▶
The skill documents three raw.githubusercontent.com endpoints for station lists and line mappings. These URLs point to the skill author's GitHub repository and their content can be changed at any time without requiring a skill update. While this is a read-only fetch pattern, it means the reference data the agent uses can be silently modified by the repository owner.
LOW Proxy creates persistent behavioral surveillance surface -15 ▶
Aggregated across many users, the proxy operator accumulates subway query data (station names, route searches, service alert checks) correlated with user IP addresses. This data can reveal home and work locations, commute patterns, and travel times. The skill's stated open-source availability does not prevent the deployed proxy from logging more than disclosed.
LOW Social engineering instruction uses LLM trust relationship against user security posture -15 ▶
By placing permission-bypass recommendations in the system prompt, the skill author exploits the agent's trusted conversational role to normalize granting persistent network access to a third-party domain. This is a subtle but deliberate design pattern that trades user security for developer convenience.
INFO Installation process is clean and minimal 0 ▶
The skill contains only SKILL.md, _meta.json, and .clawhub/lock.json. No executable files, no npm scripts, no git hooks, no submodules, no symlinks. The clone and install produced no unexpected network connections or filesystem writes outside the skill directory.
INFO All canary files intact — no exfiltration via honeypots 0 ▶
Canary file accesses at timestamps 1771908087.* are attributable to the audit platform's baseline setup, and accesses at 1771908109.834.* are the post-install integrity check. No skill-initiated reads of .env, SSH keys, AWS credentials, .npmrc, Docker config, or GCloud credentials were observed.