Back to skill
Skillv0.4.4
VirusTotal security
FlyClaw (Flight N-in-1 Search Zero Login) · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 5:22 AM
- Hash
- 55420df731f2aa6bce51605b395173bdfc2e2fe8aa86a7b8d206c3e8fbb484ad
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: flyclaw Version: 0.4.4 The FlyClaw skill bundle is a flight information aggregator that uses several unofficial and reverse-engineered APIs. It contains risky behaviors, most notably in `sources/fliggy_mcp.py`, which performs system fingerprinting by collecting the OS type, architecture, CPU count, memory tier, language, and timezone, and generates a persistent device ID stored in `cache/.device_id`. This metadata is encrypted using AES-GCM and sent to a Fliggy (Alibaba) endpoint to mimic a legitimate CLI client. Additionally, `airport_manager.py` includes an `update_from_url` function that can download and merge JSON data from a remote endpoint into the local cache. While these capabilities are likely intended to maintain API compatibility and data freshness, the collection of system-level telemetry and the remote update mechanism represent significant privacy and security risks.
- External report
- View on VirusTotal
