Back to skill
Skillv2.1.1
VirusTotal security
Roadmap Communicator · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
Apr 30, 2026, 5:52 AM
- Hash
- 54387f066dd4f393169675168c106ffa2535743d68043a2eeecd8053b592e7e2
- Source
- palm
- Code Insight
- Type: OpenClaw Skill Name: roadmap-communicator Version: 2.1.1 thought The user wants me to analyze an OpenClaw AgentSkills skill bundle (ZIP content provided as text). I need to classify it as `benign`, `suspicious`, or `malicious` based on specific criteria: - Data exfiltration - Malicious execution - Persistence/backdoors - Prompt injection against the agent - Obfuscation - Supply chain issues I must distinguish between vulnerabilities (suspicious) and intentional malice (malicious). Files provided: 1. `_meta.json`: Metadata about the skill. 2. `SKILL.md`: Instructions for the AI agent. 3. `scripts/changelog_generator.py`: A Python script to generate changelogs from git. 4. `references/communication-templates.md`: Markdown templates for communication. 5. `references/roadmap-templates.md`: Markdown templates for roadmaps. - `ownerId`, `slug` ("roadmap-communicator"), `version` ("2.1.1"), `publishedAt`. - Looks standard. - Describes the skill: preparing roadmap narratives, release notes, etc. - Provides guidance on roadmap formats and stakeholder updates. - Mentions a script: `python3 scripts/changelog_generator.py --from v1.0.0 --to HEAD`. - Includes a quality checklist. - No obvious prompt injection or instructions to exfiltrate data or perform unauthorized actions. - Purpose: Generate changelog sections from git log or piped input. - `SECTIONS`: Standard conventional commit types. - `DEMO_COMMITS`: Hardcoded sample data. - `get_git_log` function: - Uses `shutil.which("git")` to check for git. - Uses `subprocess.run(["git", "log", "--pretty=format:%s", commit_range], ...)` to get commit messages. - `commit_range` is constructed from `args.from_ref` and `args.to_ref`. - **Vulnerability Check**: `commit_range = f"{from_ref}..{to_ref}"`. If `from_ref` or `to_ref` contains shell metacharacters, could there be an injection? - `subprocess.run` is called with a list: `["git", "log", "--pretty=format:%s", commit_range]`. Since it's a list and `shell=True` is NOT set, shell injection via the arguments is generally mitigated by the OS/Python's handling of the argument list. However, `git` itself might interpret certain flags if the input starts with `-`. - The script uses `argparse` which helps define expected inputs. - `read_stdin`, `group_commits`, `render_markdown`, `render_text`: Standard logic for processing strings. - No network calls, no file writing (only printing to stdout), no reading of sensitive files (only git log). - Standard templates for emails and release notes. - No executable code or suspicious instructions. - Standard templates for roadmaps. - No executable code or suspicious instructions. - The skill is a tool for product managers/engineers to generate roadmap and changelog artifacts. - The Python script is a utility for parsing git logs. - The use of `subprocess.run` with a list is safe against shell injection. - There is no evidence of data exfiltration, persistence, or malicious intent. - The instructions in `SKILL.md` are aligned with the stated purpose. Classification: `benign`. ```json { "classification": "benign", "summary": "The roadmap-communicator skill is a legitimate tool for generating product management artifacts like roadmaps and changelogs. The included Python script (scripts/changelog_generator.py) safely uses subprocess.run with an argument list to interface with git, and the SKILL.md instructions are strictly aligned with the stated purpose without any signs of prompt injection or malicious intent." } ```
- External report
- View on VirusTotal
