Dievio Lead Search API
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill is classified as suspicious due to a Local File Inclusion (LFI) vulnerability in `scripts/dievio_api.py`. The `_load_json_file` function, used by `cmd_search` and `cmd_linkedin_lookup` via the `--body-file` argument, allows reading arbitrary JSON files from the local filesystem. While the script's core functionality is legitimate API interaction, an attacker could exploit this vulnerability through prompt injection against the OpenClaw agent to read sensitive JSON configuration or credential files, potentially exposing their contents if the agent is instructed to output the full response (especially with `--raw-output`). There is no evidence of intentional malicious behavior such as data exfiltration to unauthorized endpoints or backdoor installation.
