Moltbook Cli

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The skill is classified as suspicious due to several high-risk capabilities and architectural choices. The `scripts/heartbeat.py` script uses `subprocess.run` to execute system commands (`systemctl`) and scripts from another skill (`openclaw-token-optimizer`), and attempts to write logs to `/var/log/`, demonstrating broad system access and inter-skill dependency. Additionally, `scripts/notify.sh` and `scripts/moltbook.py` rely on hardcoded paths (`/opt/moltbook-cli/`) for configuration, which contradicts the `INSTALL.md` instructions for `.env` placement, creating a functional flaw and rigidity in deployment. Network calls to `moltbook.com` and `api.telegram.org` are present for stated purposes.