arxiv_deep_reader
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The OpenClaw Arxiv Paper Reader skill bundle is classified as benign. All code and documentation align with the stated purpose of fetching, classifying, and deeply reading arXiv papers using an LLM agent. The skill uses standard Python libraries (`langchain`, `arxiv`, `requests`, `python-dotenv`, `arxiv-to-prompt`), interacts with the arXiv API, and configures an LLM client using provided environment variables (e.g., `LLM_API_KEY`). While the skill's design involves loading markdown files (`_metadata.md`, `reading_prompt.md`) into the LLM agent's prompts, which represents a potential prompt injection surface, the content of these files within the bundle is benign and directly guides the agent's paper analysis, without any instructions for unauthorized actions, data exfiltration, or system compromise. No evidence of malicious execution, persistence mechanisms, or obfuscation was found.
