Back to skill
Skillv1.0.0

VirusTotal security

TCL (Lyon public transport network) · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:41 AM
Hash
4921d02ce05422b2dbd5500e1db0713921c1a34f46e71ed962d6a33eb096e651
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: tcl-lyon Version: 1.0.0 The skill is classified as suspicious due to multiple SQL injection vulnerabilities found in `tcl_tool.py`. Specifically, the `get_next_departures`, `get_last_departures`, and `get_first_departures` functions construct SQL queries by directly formatting user-controlled `line` and `direction` parameters into the query string (e.g., `line_filter`, `direction_filter`) instead of using parameterized queries. This allows an attacker to inject arbitrary SQL commands. Additionally, the `_get_active_services` function directly interpolates the `weekday` variable into an f-string, which is a bad practice, although not directly exploitable by user input in this context. There is no evidence of intentional malicious behavior like data exfiltration or backdoor installation, classifying these as vulnerabilities rather than malware.
External report
View on VirusTotal