Back to skill
Skillv1.0.0
VirusTotal security
OpenClaw AWS Deploy · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:08 AM
- Hash
- bb30b6df5ed97be3ac74e2ae0c8cb9f7686fb43fd328cd3f6a96d67240bcfdc2
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: openclaw-aws-deploy Version: 1.0.0 The skill is classified as suspicious due to an overly permissive IAM policy defined in `scripts/setup_deployer_role.sh`. The `SSMParameterStore` statement grants `ssm:*` actions on `Resource: "*"`, allowing the deployer identity to access, modify, or delete *any* SSM parameter in the AWS account, not just those scoped to the OpenClaw deployment. This represents a significant privilege escalation vulnerability. While the skill otherwise demonstrates strong security practices (e.g., SHA256 verification for Node.js, runtime secret fetching from SSM, SSM-only access, IMDSv2 enforcement, robust input validation, and explicit safety rules in agent `SOUL.md`/`AGENTS.md`), this IAM flaw is a critical vulnerability that could be exploited if the deployer's credentials are compromised.
- External report
- View on VirusTotal
