Back to skill
Skillv1.0.0

VirusTotal security

Alibaba Supplier Outreach · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:25 AM
Hash
57eba2c4199104b5b7baf6e552654c437de424f44cb12ccd3a7f9bd509ec4750
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: alibaba-supplier-outreach Version: 1.0.0 The skill is classified as suspicious due to its use of powerful browser automation tools (`mcp__claude-in-chrome__*`) that operate within the user's logged-in Alibaba session, and local file system write access (`~/.claude/supplier-conversations/`) for memory management. While these capabilities are plausibly needed for the stated purpose of supplier outreach and negotiation, they represent high-risk operations. Potential vulnerabilities exist in the construction of URLs using user-derived input (e.g., `[ENCODED_COMPANY_NAME]`) and the robustness of local file path handling, which could be exploited for URL injection, cross-site scripting, or path traversal if not sufficiently sanitized by the underlying tools or the skill's logic. There is no clear evidence of intentional malicious behavior, but the broad permissions and potential for exploitation warrant a 'suspicious' classification.
External report
View on VirusTotal