Back to skill
Skillv1.0.11
VirusTotal security
Telegram Footer Patch · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 5:20 AM
- Hash
- 3715d0e56d2d26f439715bf6ac2dc610fb5ef901a8aa8efd360764fcc13d7fee
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: telegram-footer-patch Version: 1.0.11 The skill patches OpenClaw's production JavaScript bundles (e.g., in `/usr/lib/node_modules/openclaw/dist`) to inject a Telegram footer, which is a high-risk operation. The injected code in `scripts/patch_reply_footer.py` uses dynamic Node.js imports (`node:fs/promises`) to read sensitive session metadata directly from the filesystem (`~/.openclaw/agents/main/sessions/sessions.json`). While the skill includes safety features like dry-runs, backups, and syntax verification, the capability to modify core application logic and access session databases represents a significant security risk, even if aligned with the stated purpose.
- External report
- View on VirusTotal
