Back to skill
Skillv1.0.0
VirusTotal security
ds160-autofill · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 29, 2026, 3:31 AM
- Hash
- 34b0018d00a1b60dde315983f35507f1bc77a16ba8a8b7ab51172a63164629c0
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: ds160-autofill Version: 1.0.0 The `scripts/ds160-filler.js` file uses `page.evaluate` to inject user-provided data from the `ds160-user-info.csv` file directly into JavaScript strings for form filling without apparent sanitization. This creates a client-side code injection vulnerability (XSS-like) within the browser context, allowing a malicious user to craft a CSV with JavaScript payloads that could be executed by the agent. While this is a risky capability and a security flaw, there is no clear evidence of intentional malicious behavior by the skill author, and other aspects like file system access and network calls are aligned with the stated purpose of automating DS-160 forms on the official website (ceac.state.gov).
- External report
- View on VirusTotal
