Back to skill
Skillv0.2.3
VirusTotal security
ContextKeeper · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:11 AM
- Hash
- 135e354d299f8abd4ad52567bbf037e57f754eb54c86d5a7a6ce1c221731a46a
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: contextkeeper Version: 0.2.3 The `scripts/ckpt.sh` file contains a JSON injection vulnerability. While most user-controlled inputs are passed through a `json_escape` function, the `files_touched` array is constructed from `git diff --name-only` output without individual filename escaping. An attacker could commit a file with a crafted name (e.g., `foo", "malicious_key": "injected_value`) to inject arbitrary JSON into the checkpoint files, potentially corrupting the agent's state or influencing future behavior. This is a lack of input sanitization, classifying it as suspicious rather than malicious due to the absence of direct evidence of intentional harmful behavior like data exfiltration or RCE within the provided code.
- External report
- View on VirusTotal
