Back to skill
Skillv1.0.0
VirusTotal security
vwu.ai gemini Models · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 6:32 AM
- Hash
- cff3b3a29bd5f0dd82ed4af349ecaf4619ba25685df471e4727e6ee4d99f045f
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: vwu-gemini Version: 1.0.0 The script `vwu-chat.sh` contains a command injection vulnerability because it expands the `$PROMPT` variable inside a double-quoted string within a `curl` command. This allows for arbitrary local command execution if the input contains shell metacharacters or substitutions (e.g., `$(...)` or backticks). While the bundle's stated purpose is to provide a wrapper for the `vwu.ai` API, the lack of input sanitization in the shell script constitutes a high-risk vulnerability.
- External report
- View on VirusTotal
