Back to skill
Skillv1.0.0

VirusTotal security

Greenhouse · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 29, 2026, 5:02 AM
Hash
dfc322ff925204e647982e6b0926542f065d50207d93732a14baaf86e89be45e
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: greenhouse Version: 1.0.0 The `scripts/greenhouse.py` file contains a `req` function that allows the `path` argument to be a full URL, which could lead to Server-Side Request Forgery (SSRF) if the `path` argument were user-controlled. Although the current skill's commands use relative paths, this general function design is a vulnerability. Additionally, user-provided arguments like `args.id` are directly inserted into URL paths without explicit sanitization, posing a minor risk of malformed API requests. The `get_env` function also attempts to read environment variables from `~/.openclaw/workspace/.env`, which, while common, expands the search scope for credentials. No evidence of intentional malicious activity (e.g., data exfiltration to unauthorized endpoints, backdoors, or prompt injection) was found.
External report
View on VirusTotal