Back to skill
Skillv0.1.0

VirusTotal security

Intern PubChem Name Conversion · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

ReviewApr 30, 2026, 5:04 AM
Hash
12be57e17a1ac1e1d22fc4ffae2f9144793b03e5b1d1e939f7094bc4a85de370
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: intern-pubchem-name-conversion Version: 0.1.0 The skill is suspicious due to a high-risk shell injection vulnerability. The `SKILL.md` instructs the agent to execute shell commands like `python3 -c '...' "$INPUT_VALUE"` and implicitly construct `curl` commands using user-controlled input (`INPUT_VALUE`). If the OpenClaw agent does not rigorously escape `INPUT_VALUE` before passing it to the shell, an attacker could inject arbitrary shell commands, leading to Remote Code Execution (RCE). While the skill's stated purpose is benign (PubChem conversion) and there's no evidence of intentional malicious behavior like data exfiltration or backdoors, the direct execution of user-controlled input in a shell context constitutes a critical vulnerability.
External report
View on VirusTotal