Back to skill
Skillv1.0.0

VirusTotal security

SiliconFlow 多模态服务,支持图片生成(FLUX/Qwen)、视频生成(Wan)、TTS语音合成、ASR语音识别。使用代金券支付。 · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:52 AM
Hash
abb5cf3a23b7f039257a18bd4dce851480c49fd167ded4ceb8a02e856a5097a6
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: siliconflow-media Version: 1.0.0 The skill bundle exhibits several vulnerabilities related to file path handling. The `scripts/asr.py` and `scripts/video_gen.py` scripts read user-specified input files (`--audio`, `--image`) and send their content to an external API (`api.siliconflow.cn`). This creates an arbitrary file read vulnerability, potentially leading to data exfiltration if an attacker can prompt the agent to read sensitive files (e.g., `/etc/passwd`, `~/.ssh/id_rsa`). Additionally, `scripts/image_gen.py`, `scripts/tts.py`, and `scripts/video_gen.py` write to user-specified output files (`--filename`). This creates an arbitrary file write vulnerability, potentially leading to persistence or privilege escalation (e.g., writing to `/etc/cron.d/malicious_job`) if the agent is prompted to write to sensitive system paths. These vulnerabilities stem from a lack of input sanitization for file paths, making the skill susceptible to prompt injection attacks against the agent, despite the scripts themselves not exhibiting malicious intent.
External report
View on VirusTotal