Back to skill
Skillv1.0.4

VirusTotal security

Stirling PDF · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 3:56 AM
Hash
5b694a544476012d113bc4a0919855ae0700e2b95e027a9d6bc8d10e42fbfaf0
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: stirling-pdf Version: 1.0.4 The `scripts/pdf.js` wrapper script is vulnerable to local file disclosure and arbitrary file write due to insufficient input sanitization when constructing `curl` commands. User-controlled input for the output file path (`-o`) is passed directly to `curl`, allowing arbitrary file writes. Furthermore, user-controlled input for form field values (e.g., watermark text via `-t`) is passed to `curl -F`, which can be exploited by injecting `@/path/to/sensitive/file` to read and exfiltrate local files to the configured Stirling-PDF server. The `SKILL.md` directly instructs the AI agent to execute these commands with user-provided arguments, creating a prompt injection surface for these vulnerabilities.
External report
View on VirusTotal