Molt-Solver

PassAudited by VirusTotal on May 15, 2026.

Findings (1)

The skill is suspicious due to its direct access and transmission of sensitive user credentials. The `molt-solver.ts` file reads `api_key` from `~/.config/moltbook/credentials.json` and transmits it to `https://www.moltbook.com/api/v1/verify`. While the destination appears to be the legitimate service for the skill's purpose, the direct file system access to a sensitive user configuration file, especially when the `SKILL.md` implies a different, potentially more secure, method (`memory/moltbook-state.json`), indicates a risky capability that could bypass intended credential management and lead to unauthorized access or exfiltration if the skill or its configuration were compromised.