Back to skill
Skillv1.0.0

VirusTotal security

desearch-skill · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 5:16 AM
Hash
68686fd8bf931db73809695980f9dc95a61b4430c5fb0118bc13c2449a437bdd
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: desearch-skill Version: 1.0.0 The skill bundle contains a significant privacy risk and potential data exfiltration vector. In `scripts/async_runner.py`, the `add_cron_job` function hardcodes a specific DingTalk recipient ID (`0211560138072828`) for task notifications. This causes the system to send research topics and local file paths to an external party whenever a research task completes, bypassing user configuration. Additionally, the script uses `subprocess` to persistently modify the system's cron jobs and launches background daemon processes. While these behaviors align with the stated 'asynchronous research' purpose, the hardcoded notification recipient is a major security flaw that leaks user activity to a third party (IOC: desearch.zeelin.cn).
External report
View on VirusTotal