Back to skill
Skillv0.0.5

VirusTotal security

OpenStoryline Use · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 5:51 AM
Hash
5a015461c595f1e0291e071892b45d98483949780ea6691d9435d48aa97acd6b
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: openstoryline-use Version: 0.0.5 The skill bundle contains a script, 'feishu_file_sender.py', which programmatically accesses the sensitive OpenClaw global configuration file (~/.openclaw/openclaw.json) to extract Feishu API credentials (appId and appSecret). It then uses these credentials to upload local files to external Feishu endpoints (open.feishu.cn). While this behavior is documented in 'SKILL.md' as a feature for sending rendered videos to a user's mobile device, the programmatic access to master configuration files and the capability to exfiltrate arbitrary local files to an external messaging platform represent high-risk operations that could be repurposed for data exfiltration.
External report
View on VirusTotal