Back to skill
Skillv4.1.0

VirusTotal security

Codecast · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 27, 2026, 3:36 AM
Hash
872f5886763c9279b0bd6da43e8cccb1eaf3aa0a45635045d8ddce61cd13c007
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: codecast Version: 4.1.0 The skill is classified as suspicious primarily due to a critical shell injection vulnerability found in `scripts/parallel-tasks.sh` and `scripts/review-pr.sh`. Both scripts use `eval` to construct and execute `dev-relay.sh` commands, where arguments like `WORKDIR`, `TASK_DIR`, `TASK_PROMPT`, and `CUSTOM_PROMPT` are derived from user-controlled input (e.g., `tasks.txt` or CLI flags). If these inputs contain shell metacharacters, they could lead to arbitrary command execution (RCE) on the host system. While the skill's stated purpose is benign (streaming agent sessions to Discord), this vulnerability allows for unauthorized execution. Additionally, the skill handles sensitive Discord bot tokens (from environment, macOS Keychain, or files like `.bot-token`), and `scripts/discord-bridge.py` allows external Discord users to send arbitrary input to agent sessions, which, while documented, represents a powerful capability that could be misused.
External report
View on VirusTotal