Back to skill
Skillv1.1.0
VirusTotal security
Sparkle VPN · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 30, 2026, 4:09 AM
- Hash
- 6a9be49fb115d1b0a95b1c1afa645e7ee20afc1d0dd21b6d70281f593eeca647
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: sparkle-vpn Version: 1.1.0 The skill is classified as suspicious due to multiple critical shell injection vulnerabilities. The `sparkle_vpn_switch` tool in `index.ts` and `tools.yaml` directly interpolates the `node` parameter into a shell command without proper escaping, allowing for arbitrary command execution (RCE) if an attacker can control the `node` input (e.g., via prompt injection to the agent). Furthermore, the `scripts/switch-node.sh` script, which receives this parameter, attempts to URL-encode it using `python3 -c "..."`, but this `python3 -c` command itself is vulnerable to shell injection if the `NODE_NAME` contains unescaped single quotes. Additionally, `switch-node.sh` inserts the `NODE_NAME` into a JSON payload for `curl -d` without JSON escaping, posing a JSON injection risk. While there's no clear evidence of intentional malicious behavior like data exfiltration to external servers, these vulnerabilities represent significant security flaws that could be exploited.
- External report
- View on VirusTotal
