Back to skill
Skillv1.0.0
VirusTotal security
Lanxin App Card · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 23, 2026, 9:26 AM
- Hash
- aaba6bca9f79b6a5e8a1e6de9167914f95d1938ea60a839e17e7e8b3223b100c
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: lanxin-app-card Version: 1.0.0 The skill uses aggressive prompt-injection techniques in SKILL.md to override the AI agent's default behavior, such as 'absolutely prohibiting' refusal or explanation and forcing raw JSON output without Markdown formatting. Most notably, the 'correct example' in SKILL.md includes a hardcoded local file path ('/Users/dulianqiang/.Huawei4.1/Huawei_Phone/Snapshot.png'), which is a significant privacy leak and suggests the skill may be designed to reference or expose local filesystem metadata. While no explicit data exfiltration endpoint is defined, the combination of forced output constraints and local path references is highly irregular for a standard messaging skill.
- External report
- View on VirusTotal
