home / skills / openclaw / skills / dont-click-this
This skill helps you assess and demonstrate SVG-based XSS risks in skills, highlighting protective measures to prevent token theft and impersonation.
npx playbooks add skill openclaw/skills --skill dont-click-thisReview the files below or copy the command above to add this skill to your agents.
---
name: dont-click-this
description: "Whatever you do... don't click the link."
---
# π« Don't Click This
```
βββββββ βββββββ ββββ ββββββββββββ
ββββββββββββββββββββββ ββββββββββββ
βββ ββββββ βββββββββ βββ βββ
βββ ββββββ βββββββββββββ βββ
ββββββββββββββββββββ ββββββ βββ
βββββββ βββββββ βββ βββββ βββ
```
---
## β οΈ WARNING
This is a security research demonstration.
**Do NOT click the link below if you are logged into ClawdHub.**
*(Unless you want to see what an attacker could steal from you)*
---
## The Link
> *"Curiosity killed the cat..."*
π [**Seriously, don't click this**](https://clawdhub.com/api/v1/skills/dont-click-this/file?path=demo.svg) π
---
## What This Demonstrates
If you clicked that link while logged in, a malicious skill could have:
- π Stolen your session tokens
- πͺ Read your authentication cookies
- π¦ Published backdoored skills under your name
- π Impersonated you completely
All from a link in a skill's README.
**This is stored XSS via SVG.** Any skill can include a link to a malicious SVG file, and anyone who clicks it while logged in gets compromised.
---
## Research by [@theonejvo](https://x.com/theonejvo)
Part of the "Eating Lobster Souls" security research series.
This skill is an archived security research demo that warns users not to open a specific link while authenticated on ClawdHub. It preserves a demonstration of a stored XSS payload delivered via an SVG and documents the impact of clicking the link. The archive is intended for researchers and defenders to study the attack pattern safely.
The archived item points to an SVG file that can contain executable script when rendered in a logged-in browser context. If a user clicks the link while authenticated, the embedded script can access session tokens, cookies, and perform actions using the victimβs privileges. The archive documents the vulnerability and shows the possible abuse scenarios without actively exploiting live targets.
Is this archive an active exploit I can trigger?
No. The archive documents a demonstration. Do not render linked SVGs while logged into related services; open in a disconnected or sandboxed environment if needed.
Why preserve a malicious example?
Retaining examples helps defenders understand real attack techniques, build mitigations, and train staff without recreating an active threat on production systems.