VirusTotal Hash Analyzer
Analysis
This appears to be a straightforward VirusTotal lookup helper, but it uses your VirusTotal API key and sends queried indicators to VirusTotal.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Source: unknown; Homepage: none; Version: 1.0.2
The registry metadata has limited provenance and differs from the included artifact metadata that declares version 2.0.0. No risky install behavior is shown, but the release identity should be checked.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
key = os.environ.get("VT_API_KEY", "").strip()The helper reads a VirusTotal API key from the environment to authenticate lookups. This is expected for the stated integration, but it uses the user's VirusTotal account identity and quota.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
VT_API_BASE = "https://www.virustotal.com/api/v3"
The script sends queried IOC values to the VirusTotal API. This is central to the skill's purpose and disclosed, but IOCs such as internal domains, URLs, or IPs can be sensitive.
