Back to skill
Skillv4.1.0
VirusTotal security
Codecast · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 27, 2026, 3:36 AM
- Hash
- 872f5886763c9279b0bd6da43e8cccb1eaf3aa0a45635045d8ddce61cd13c007
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: codecast Version: 4.1.0 The skill is classified as suspicious primarily due to a critical shell injection vulnerability found in `scripts/parallel-tasks.sh` and `scripts/review-pr.sh`. Both scripts use `eval` to construct and execute `dev-relay.sh` commands, where arguments like `WORKDIR`, `TASK_DIR`, `TASK_PROMPT`, and `CUSTOM_PROMPT` are derived from user-controlled input (e.g., `tasks.txt` or CLI flags). If these inputs contain shell metacharacters, they could lead to arbitrary command execution (RCE) on the host system. While the skill's stated purpose is benign (streaming agent sessions to Discord), this vulnerability allows for unauthorized execution. Additionally, the skill handles sensitive Discord bot tokens (from environment, macOS Keychain, or files like `.bot-token`), and `scripts/discord-bridge.py` allows external Discord users to send arbitrary input to agent sessions, which, while documented, represents a powerful capability that could be misused.
- External report
- View on VirusTotal
