Back to skill
Skillv1.0.1

VirusTotal security

WeChat Studio · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 8, 2026, 4:31 AM
Hash
8562132c32c0518d9a0fe5d01799e427fde00cd013786e5353de527cf7ade43f
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: content-system-wechat-studio Version: 1.0.1 The skill bundle contains a significant path traversal vulnerability in `frontend/server.py`. The `resolve_workspace_path` function fails to properly sanitize relative paths containing '..', allowing the `/api/assets` endpoint to read arbitrary files from the host system. Additionally, `frontend/extract_live_reference.js` utilizes Playwright to visit arbitrary user-provided URLs, which poses a risk of Server-Side Request Forgery (SSRF). The bundle also includes hardcoded local user paths (e.g., `/Users/Abigale/...`) and directs users to external services like `suxi.ai`, which may indicate improper packaging or environment-specific risks.
External report
View on VirusTotal