Back to skill
Skillv1.0.3
VirusTotal security
Private Web App (PWA) · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:23 AM
- Hash
- dbdd46b5666f847f257682ae06481073cbfedb8af0623cbe7ffdd285617d0c51
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: privateapp Version: 1.0.3 The skill bundle is classified as suspicious due to several critical vulnerabilities. The `scripts/server.py` and `scripts/app_loader.py` allow for Remote Code Execution (RCE) by enabling users to add arbitrary directories as app discovery paths via the `/api/settings/paths` API, from which Python backend code (`backend/routes.py`) can be dynamically loaded and executed. Additionally, the `apps/system-monitor/backend/routes.py` exposes unauthenticated API endpoints (`/api/app/sysmon/action/restart`, `/api/app/sysmon/action/shutdown`) that execute `sudo reboot` or `sudo shutdown`, allowing any network-accessible client to control system power. The `scripts/install.sh` also presents a supply chain risk by using `curl -fsSL ... | sh` to install Tailscale, a pattern vulnerable to remote code execution if the source script is compromised. Finally, the custom markdown renderer in `apps/file-browser/frontend/src/App.tsx` uses `dangerouslySetInnerHTML`, posing a potential Cross-Site Scripting (XSS) vulnerability.
- External report
- View on VirusTotal
