Back to skill
Skillv1.0.0

VirusTotal security

Voice2text · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

BenignApr 30, 2026, 4:51 AM
Hash
f607501cf85c39ae7fd1096786092053f1ad1e8b4a09da3f62c578ea663ed7e4
Source
palm
Verdict
benign
Code Insight
Type: OpenClaw Skill Name: voice2text Version: 1.0.0 The skill bundle implements an offline speech-to-text function using the Vosk library. Its core functionality involves opening a user-provided audio file path (`audio_path`) using `wave.open()` in `main.py`. While user-controlled file paths can be a vulnerability, the `wave.open()` function is specific to WAV files and is highly unlikely to successfully open and parse arbitrary non-WAV files (e.g., `/etc/passwd`) to leak their content; it would typically raise an error. There is no evidence of intentional malicious behavior such as data exfiltration, command execution, persistence, or prompt injection attempts against the AI agent. The file access is inherent to the skill's stated purpose, and the specific library function used mitigates the risk of arbitrary file reads.
External report
View on VirusTotal