Back to skill
Skillv0.4.0
VirusTotal security
Slither Audit · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:15 AM
- Hash
- a338a82d4f0360ee87200b6926ad6dd8ce732acd4c1cb3edc4b17a2fe6a7c111
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: slither-audit Version: 0.4.0 The `slither-audit.py` script executes the `slither` command using `subprocess.run` with a user-provided `contract_path`. While `subprocess.run` with a list of arguments mitigates direct shell injection, passing user-controlled input directly to an external command introduces a potential command/argument injection vulnerability, which could lead to Remote Code Execution (RCE) if the `slither` tool or the underlying system is exploitable. This is a significant vulnerability, but there is no clear evidence of intentional malicious behavior (e.g., data exfiltration, persistence, or explicit harmful instructions), thus classifying it as 'suspicious' rather than 'malicious'.
- External report
- View on VirusTotal
