Back to skill
Skillv2.1.0
VirusTotal security
Drission Agent · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 30, 2026, 6:25 AM
- Hash
- 8773acc2a7cc75705b8e7555406db8724ed910a6e2e153a10306033a810dfcca
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: drission-agent Version: 2.1.0 The toolkit employs 'security theater' through hyperbolic language ('Fortress Sovereign Edition', 'SOTA_NUCLEAR_CONFIRMED') and a trivial environment variable gate that provides no real security. A TCP relay script (python_relay.py) is included to tunnel traffic to the Chrome DevTools Protocol port (9222), which is a high-risk capability for browser manipulation. While the provided code for main_engine.py is a benign arXiv scraper, the SKILL.md documentation references aggressive, missing modules like 'force_takeover.py' and 'ultra_experiment.py' (protocol impersonation), suggesting a focus on bypassing standard automation constraints.
- External report
- View on VirusTotal
