安全扫描
OpenClaw
可疑
high confidenceNULL
评估建议
This skill appears to be what it claims (tools for MicroPython boards) but has two important caution points: (1) wifi_setup.py writes Wi‑Fi credentials and a WebREPL password to files on the device and prints the password in a RESULT JSON — that can expose secrets in logs or agent output. (2) firmware_flash.py performs full flash/erase operations which can permanently erase device files and brick devices if used incorrectly. Before installing or using: review the wifi_setup.py and firmware_flash...详细分析 ▾
✓ 用途与能力
Name and description align with the included scripts and SKILL.md. Required binaries (python3, mpremote, esptool) are appropriate for probing devices, flashing firmware, and executing code. The presence of device_probe, firmware_flash, webrepl_exec and wifi_setup scripts is coherent with the stated capabilities.
⚠ 指令范围
The SKILL.md instructs the agent to run bundled scripts that modify device state (write files, update boot.py, enable WebREPL, erase/flash firmware). The wifi_setup flow requests user Wi‑Fi credentials (expected) but the WiFi setup code writes plaintext credentials to device files (boot.py and webrepl_cfg.py) and prints the webrepl password inside a RESULT JSON — this contradicts the skill's own safety guidance that passwords should not be saved or echoed. Firmware flashing and erase_flash behaviors are labeled 'Dangerous' in the references, which is appropriate, but the scripts must strictly require explicit user confirmation; ensure the agent never auto-uses --yes without an explicit user consent.
✓ 安装机制
No install spec (instruction-only) reduces install-time risk. Firmware downloads in firmware_flash.py come from micropython.org (trusted), and scripts use standard Python stdlib and expected third-party tools. No untrusted or short‑URL downloads or arbitrary remote code hosting were found.
ℹ 凭证需求
The skill requests no environment variables or external credentials (good). However, it explicitly asks users for Wi‑Fi SSID/password and a WebREPL password and then persists and prints those secrets in device files and script output — this is disproportionate from a secrecy standpoint and risks accidental exfiltration via logs or agent output parsing.
ℹ 持久化与权限
The skill does not set always:true and does not require system-level credentials. It does modify device‑local persistent storage (writes boot.py, webrepl_cfg.py, backs up files, erases/flashes device). Those device-level persistent actions are expected for this domain but are high‑impact operations; they should always require explicit, unambiguous user confirmation before execution.
安全有层次,运行前请审查代码。
运行时依赖
🖥️ OSLinux · macOS · Windows
版本
latestv1.0.02026/3/25
NULL
● 可疑
安装命令
点击复制官方npx clawhub@latest install micropython-skills
镜像加速npx clawhub@latest install micropython-skills --registry https://cn.longxiaskill.com