Back to skill
Skillv1.1.2
VirusTotal security
ClawAPI Manager · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:54 AM
- Hash
- 1c70cdd34c0ae55f0bc2d237f93f48b0cbb6961a26d4720b23aa3c1d0722e37d
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: clawapi-manager Version: 1.1.2 The skill is classified as suspicious due to several high-risk capabilities, primarily involving privileged system operations and direct manipulation of core OpenClaw configuration. Specifically, `install.sh` attempts to modify system-wide logrotate configuration (`/etc/logrotate.d`) and suggests cron job installation, which are privileged operations and potential persistence mechanisms. The `read_openclaw_config.sh` script extracts API keys from the main OpenClaw configuration and writes them to a new `.env` file, creating an additional sensitive credential storage point. Furthermore, several scripts (`auto_rotate.sh`, `check_cost.sh`, `check_quota.sh`, `lib/notifier.py`) perform external network calls for notifications, and core Python modules (`claw_api_manager_central.py`, `lib/config_manager.py`, `lib/model_switcher.py`, `clawapi_helper.py`) directly modify the sensitive `~/.openclaw/openclaw.json` file, including API keys and routing. The `clawapi_helper.py` script is explicitly designed to expose these configuration manipulation functions to an AI agent, posing a significant prompt injection risk for unauthorized configuration changes.
- External report
- View on VirusTotal
