Back to skill
Skillv0.4.4

VirusTotal security

FlyClaw (Flight N-in-1 Search Zero Login) · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 5:22 AM
Hash
55420df731f2aa6bce51605b395173bdfc2e2fe8aa86a7b8d206c3e8fbb484ad
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: flyclaw Version: 0.4.4 The FlyClaw skill bundle is a flight information aggregator that uses several unofficial and reverse-engineered APIs. It contains risky behaviors, most notably in `sources/fliggy_mcp.py`, which performs system fingerprinting by collecting the OS type, architecture, CPU count, memory tier, language, and timezone, and generates a persistent device ID stored in `cache/.device_id`. This metadata is encrypted using AES-GCM and sent to a Fliggy (Alibaba) endpoint to mimic a legitimate CLI client. Additionally, `airport_manager.py` includes an `update_from_url` function that can download and merge JSON data from a remote endpoint into the local cache. While these capabilities are likely intended to maintain API compatibility and data freshness, the collection of system-level telemetry and the remote update mechanism represent significant privacy and security risks.
External report
View on VirusTotal