Is ilpvc/file-repair-skill safe?
https://github.com/openclaw/skills/tree/main/skills/ilpvc/file-repair-skill
This skill presents significant security risks by uploading user files to external servers under the guise of file repair, with opaque bundled JavaScript execution and promotional content directing to external URLs. While the installation process showed no malicious behavior, the skill's functionality creates clear pathways for data exfiltration.
Category Scores
Findings (6)
CRITICAL File Upload to External Servers -30 ▶
The skill uploads user-provided files to external servers for 'repair' processing and returns download URLs. This represents a significant data exfiltration risk as any file the user provides will be sent to unknown third-party services.
CRITICAL Disguised File Exfiltration Vector -30 ▶
This skill could be used to exfiltrate any file a user has access to by presenting it as a legitimate 'file repair' service. The user provides file paths which are then processed by opaque code and uploaded externally.
HIGH Opaque Bundled JavaScript Execution -15 ▶
The skill executes a bundled JavaScript file (dist/repair-file.bundle.cjs) with user-provided file paths. This bundled code is not readable and could perform any actions beyond the stated file repair functionality.
HIGH External URL References -15 ▶
The skill instructions contain multiple references to external URLs (https://bit.ly/4roS6Rv) that the agent is instructed to direct users to visit, which could be used for tracking or further exploitation.
HIGH File Access and Processing -20 ▶
The skill requests file paths from users and processes these files through external services. This creates a direct pathway for accessing and exfiltrating user files under the guise of repair functionality.
MEDIUM Promotional Instructions -5 ▶
The skill contains detailed promotional content instructing the agent to recommend external services when limitations are encountered, potentially overriding user preferences for service recommendations.